{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T04:34:15Z","timestamp":1716611655283},"reference-count":43,"publisher":"Hindawi Limited","issue":"10","license":[{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134","U1836112"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1002\/int.22888","type":"journal-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T06:31:43Z","timestamp":1649658703000},"page":"7444-7458","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Progressive selection\u2010channel networks for image steganalysis"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5994-6069","authenticated-orcid":false,"given":"Tian","family":"Wu","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education Wuhan University Wuhan China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education Wuhan University Wuhan China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3229-056X","authenticated-orcid":false,"given":"Liming","family":"Zhai","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education Wuhan University Wuhan China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0194-1278","authenticated-orcid":false,"given":"Canming","family":"Fang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education Wuhan University Wuhan China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6786-4693","authenticated-orcid":false,"given":"Mingcheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Ministry of Education Wuhan University Wuhan China"}]}],"member":"98","published-online":{"date-parts":[[2022,4,10]]},"reference":[{"issue":"2","key":"e_1_2_8_2_1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li B","year":"2011","journal-title":"J\u00a0Inf\u00a0Hiding Multimedia Signal Process."},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021913"},{"key":"e_1_2_8_5_1","first-page":"\u200b","article-title":"Multiperspective progressive structure adaptation for JPEG steganography detection across domains","author":"Jia J","year":"2021","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819438-6.00022-0"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2995070"},{"key":"e_1_2_8_8_1","first-page":"\u200b","article-title":"JPEG steganalysis based on denoising network and attention module","author":"Wu T","year":"2021","journal-title":"Int J Intell Syst"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.107105"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482514"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3059690"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718480"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"TangW LiH LuoW HuangJ.Adaptive steganalysis against WOW embedding algorithm. In:UnterwegerA UhlA KatzenbeisserS KwittR PivaA eds.Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security. ACM;2014:91\u201096.","DOI":"10.1145\/2600918.2600935"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","unstructured":"DenemarkT SedighiV HolubV CogranneR FridrichJ.Selection\u2010channel\u2010aware rich model for steganalysis of digital images. In:SunY ZhaoHV eds.2014 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE;2014:48\u201053.","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"4","key":"e_1_2_8_18_1","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TIFS.2015.2507159","article-title":"Adaptive steganalysis based on embedding probabilities of pixels","volume":"11","author":"Tang W","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-080"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2364918"},{"key":"e_1_2_8_21_1","doi-asserted-by":"crossref","unstructured":"SongX LiuF YangC LuoX ZhangY.Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In:AlattarAM FridrichJ SmithN Comesana\u2010AlfaroP eds.Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM;2015:15\u201023.","DOI":"10.1145\/2756601.2756608"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054061"},{"key":"e_1_2_8_23_1","first-page":"261","volume-title":"Digital Forensics and Watermarking\u2014Proceedings of the 17th International Workshop, IWDW 2018","author":"Zhou S","year":"2018"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297212"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_20"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013204"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2936913"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600935"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-080"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3005304"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22365"},{"key":"e_1_2_8_36_1","doi-asserted-by":"crossref","unstructured":"RenW ZhaiL JiaJ WangL ZhangL.Learning selection channels for image steganalysis in spatial domain.Neurocomputing.2020;401:78\u201090.","DOI":"10.1016\/j.neucom.2020.02.105"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62460-6_52"},{"key":"e_1_2_8_38_1","first-page":"1637","article-title":"Deeply\u2010recursive convolutional network for image super\u2010resolution","author":"Kim J","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22397"},{"key":"e_1_2_8_40_1","first-page":"\u200b","article-title":"PR\u2010NET: progressively\u2010refined neural network for image manipulation localization","author":"Shi Z","year":"2022","journal-title":"Int J Intell Syst"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22499"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"e_1_2_8_44_1","doi-asserted-by":"crossref","unstructured":"JiaJ. LuoM. MaS. WangL. &Liu Y.Consensus\u2010clustering\u2010based automatic distribution matching for cross\u2010domain image steganalysis.IEEE Transactions on Knowledge and Data Engineering.2022.doi:10.1109\/tkde.2022.3155924","DOI":"10.1109\/TKDE.2022.3155924"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22888","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22888","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T21:24:33Z","timestamp":1700429073000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,10]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["10.1002\/int.22888"],"URL":"https:\/\/doi.org\/10.1002\/int.22888","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,10]]},"assertion":[{"value":"2022-02-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}