{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:06:11Z","timestamp":1743077171531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193205"},{"type":"electronic","value":"9783319193212"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19321-2_43","type":"book-chapter","created":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T17:20:34Z","timestamp":1432747234000},"page":"559-573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Variable Multi-dimensional Co-occurrence for Steganalysis"],"prefix":"10.1007","author":[{"given":"Licong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Patchara","family":"Sutthiwan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,28]]},"reference":[{"issue":"2","key":"43_CR1","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010)"},{"issue":"3","key":"43_CR3","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-24178-9_5"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-24178-9_6","volume-title":"Information Hiding","author":"G Gul","year":"2011","unstructured":"Gul, G., Kurugollu, F.: A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 71\u201384. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-24178-9_6"},{"key":"43_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-24178-9_8","volume-title":"Information Hiding","author":"J Fridrich","year":"2011","unstructured":"Fridrich, J., Kodovsk\u00fd, J., Holub, V., Goljan, M.: Steganalysis of content-adaptive steganography in spatial domain. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 102\u2013117. Springer, Heidelberg (2011)"},{"key":"43_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-642-36373-3_5","volume-title":"Information Hiding","author":"YQ Shi","year":"2013","unstructured":"Shi, Y.Q., Sutthiwan, P., Chen, L.: Textural features for steganalysis. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 63\u201377. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-36373-3_5"},{"issue":"3","key":"43_CR8","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-40099-5_3","volume-title":"Digital Forensics and Watermaking","author":"L Chen","year":"2013","unstructured":"Chen, L., Shi, Y.Q., Sutthiwan, P., Niu, X.: A novel mapping scheme for steganalysis. In: Shi, Y.Q., Kim, H.-G. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 19\u201333. Springer, Heidelberg (2013)"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-662-43886-2_4","volume-title":"Digital-Forensics and Watermarking","author":"L Chen","year":"2014","unstructured":"Chen, L., Shi, Y.Q., Sutthiwan, P., Niu, X.: Non-uniform quantization in breaking HUGO. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 48\u201362. Springer, Heidelberg (2014)"},{"issue":"12","key":"43_CR11","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996\u20132006 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR12","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TSMC.1973.4309314","volume":"SMC\u20133","author":"RM Haralick","year":"1973","unstructured":"Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC\u20133, 610\u2013621 (1973)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T.: Co-occurrence steganalysis in high dimensions. In: IS&T\/SPIE Electronic Imaging. International Society for Optics and Photonics, pp. 83 030B\u201383 030B (2012)","DOI":"10.1117\/12.908914"},{"key":"43_CR14","unstructured":"Oja, E., Valkealahti, K.: Compressing higher-order co-occurrences for texture analysis using the self-organizing map. In: Proceedings of IEEE International Conference on Neural Networks, vol. 2, pp. 1160\u20131164 (1995)"},{"issue":"2","key":"43_CR15","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on lsb matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201\u2013214 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"43_CR16","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19321-2_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T01:41:05Z","timestamp":1676943665000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19321-2_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193205","9783319193212"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19321-2_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}