{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:43:09Z","timestamp":1735584189467},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s11042-018-6155-6","type":"journal-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T07:35:07Z","timestamp":1529912107000},"page":"1473-1494","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Feature selection for image steganalysis using levy flight-based grey wolf optimization"],"prefix":"10.1007","volume":"78","author":[{"given":"Yadunath","family":"Pathak","sequence":"first","affiliation":[]},{"given":"K. V.","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Shailendra","family":"Tiwari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"6155_CR1","first-page":"1","volume":"28","author":"S Amirsadri","year":"2017","unstructured":"Amirsadri S, Mousavirad SJ, Ebrahimpour-Komleh H (2017) A levy flight-based grey wolf optimizer combined with back-propagation algorithm for neural network training. Neural Comput & Applic 28:1\u201314","journal-title":"Neural Comput & Applic"},{"key":"6155_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11517-013-1123-9","volume":"52","author":"S Bhattacharyya","year":"2014","unstructured":"Bhattacharyya S, Sengupta A, Chakraborti T, Konar A, Tibarewala D (2014) Automatic feature selection of motor imagery eeg signals using differential evolution and learning automata. Med Biol Eng Comput 52:131\u2013139","journal-title":"Med Biol Eng Comput"},{"key":"6155_CR3","doi-asserted-by":"crossref","unstructured":"Chechkin AV, Metzler R, Klafter J, Gonchar VY et al. (2008) Introduction to the theory of l\u00e9vy flights, Anomalous transport: Foundations and applications 129\u2013162","DOI":"10.1002\/9783527622979.ch5"},{"key":"6155_CR4","doi-asserted-by":"crossref","unstructured":"Chen C, Shi YQ (2008) Jpeg image steganalysis utilizing both intrablock and interblock correlations. In: Proc of IEEE international symposium on circuits and systems, pp 3029\u20133032","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"6155_CR5","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s13042-015-0448-0","volume":"7","author":"RR Chhikara","year":"2016","unstructured":"Chhikara RR, Sharma P, Singh L (2016) A hybrid feature selection approach based on improved pso and filter approaches for image steganalysis. Int J Mach Learn Cybern 7:1195\u20131206","journal-title":"Int J Mach Learn Cybern"},{"key":"6155_CR6","first-page":"1","volume":"6","author":"RR Chhikara","year":"2016","unstructured":"Chhikara RR, Sharma P, Singh L (2016) An improved dynamic discrete firefly algorithm for blind image steganalysis. Int J Mach Learn Cybern 6:1\u201315","journal-title":"Int J Mach Learn Cybern"},{"key":"6155_CR7","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1016\/S0165-1684(01)00064-0","volume":"81","author":"SF Cotter","year":"2001","unstructured":"Cotter SF, Kreutz-Delgado K, Rao BD (2001) Backward sequential elimination for sparse vector subset selection. Signal Process 81:1849\u20131864","journal-title":"Signal Process"},{"key":"6155_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3233\/IDA-1997-1302","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash M, Liu H (1997) Feature selection for classification. Intelligent Data Analysis 1:131\u2013156","journal-title":"Intelligent Data Analysis"},{"key":"6155_CR9","first-page":"1503","volume":"8","author":"S Deepa","year":"2017","unstructured":"Deepa S (2017) Steganalysis on images using svm with selected hybrid features of gini index feature selection algorithm. Int J Adv Res Comput Sci 8:1503\u20131509","journal-title":"Int J Adv Res Comput Sci"},{"key":"6155_CR10","unstructured":"Deng H, Runger G (2012) Feature selection via regularized trees. In: Proc of international joint conference on neural networks, pp 1\u20138"},{"key":"6155_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","volume":"1","author":"J Derrac","year":"2011","unstructured":"Derrac J, Garc\u00eda S, Molina D, Herrera F (2011) A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol Comput 1:3\u201318","journal-title":"Swarm Evol Comput"},{"key":"6155_CR12","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of lsb steganography via sample pair analysis. IEEE Trans Signal Process 51:1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"key":"6155_CR13","doi-asserted-by":"crossref","unstructured":"Emary E, Zawbaa HM, Grosan C, Hassenian AE (2015) Feature subset selection approach by gray-wolf optimization. In: Proc of Afro-European conference for industrial advancement, pp 1\u201313","DOI":"10.1007\/978-3-319-13572-4_1"},{"key":"6155_CR14","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2015.06.083","volume":"172","author":"E Emary","year":"2016","unstructured":"Emary E, Zawbaa HM, Hassanien AE (2016) Binary grey wolf optimization approaches for feature selection. Neurocomputing 172:371\u2013381","journal-title":"Neurocomputing"},{"key":"6155_CR15","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (2004) On estimation of secret message length in lsb steganography in spatial domain. In: Security, steganography, and watermarking of multimedia contents VI, pp 23\u201335","DOI":"10.1117\/12.521350"},{"key":"6155_CR16","unstructured":"Glorot X, Bordes A, Bengio Y (2011) Deep sparse rectifier neural networks. In: Proc of international conference on artificial intelligence and statistics, pp 315\u2013323"},{"key":"6155_CR17","doi-asserted-by":"crossref","unstructured":"Guettari N, Capelle-Laiz\u00e9 AS, Carr\u00e9 P (2016) Blind image steganalysis based on evidential k-nearest neighbors. In: Proc of IEEE international conference on image processing, pp 2742\u20132746","DOI":"10.1109\/ICIP.2016.7532858"},{"key":"6155_CR18","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon I, Weston J, Barnhill S, Vapnik V (2002) Gene selection for cancer classification using support vector machines. Mach Learn 46:389\u2013422","journal-title":"Mach Learn"},{"key":"6155_CR19","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1504\/IJMMNO.2013.055204","volume":"4","author":"M Jamil","year":"2013","unstructured":"Jamil M, Yang X-S (2013) A literature survey of benchmark functions for global optimisation problems. International Journal of Mathematical Modelling and Numerical Optimisation 4:150\u2013194","journal-title":"International Journal of Mathematical Modelling and Numerical Optimisation"},{"key":"6155_CR20","doi-asserted-by":"crossref","unstructured":"Kodovsky\u0300 J, Fridrich J (2009) Calibration revisited. In: Proc of ACM workshop on multimedia and security, pp 63\u201374","DOI":"10.1145\/1597817.1597830"},{"key":"6155_CR21","doi-asserted-by":"crossref","unstructured":"Kodovsky\u0300 J, Fridrich J (2011) Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Media watermarking, security, and forensics III, p 78800L","DOI":"10.1117\/12.872279"},{"key":"6155_CR22","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7:432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6155_CR23","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi R, John GH (1997) Wrappers for feature subset selection. Artif Intell 97:273\u2013324","journal-title":"Artif Intell"},{"key":"6155_CR24","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"6155_CR25","doi-asserted-by":"crossref","unstructured":"Liu Q (2011) Steganalysis of dct-embedding based adaptive steganography and yass. In: Proc of ACM multimedia workshop on multimedia and security, pp 77\u201386","DOI":"10.1145\/2037252.2037267"},{"key":"6155_CR26","doi-asserted-by":"crossref","unstructured":"Lu P, Luo X, Tang Q, Li S (2004) An improved sample pairs method for detection of lsb embedding. In: Information hiding, vol 3200. Springer, pp 116\u2013127","DOI":"10.1007\/978-3-540-30114-1_9"},{"key":"6155_CR27","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1016\/j.sigpro.2008.03.016","volume":"88","author":"X-Y Luo","year":"2008","unstructured":"Luo X-Y, Wang D-S, Wang P, Liu F-L (2008) A review on blind detection for image steganography. Signal Process 88:2138\u20132157","journal-title":"Signal Process"},{"key":"6155_CR28","first-page":"215","volume":"18","author":"DL Massart","year":"2005","unstructured":"Massart DL, Smeyers-verbeke AJ et al. (2005) Visual presentation of data by means of box plots, Practical data handling. LC-GC Europe 18:215\u2013218","journal-title":"LC-GC Europe"},{"key":"6155_CR29","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"6155_CR30","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.engappai.2013.09.016","volume":"31","author":"FG Mohammadi","year":"2014","unstructured":"Mohammadi FG, Abadeh MS (2014) Image steganalysis using a bee colony based feature selection algorithm. Eng Appl Artif Intell 31:35\u201343","journal-title":"Eng Appl Artif Intell"},{"key":"6155_CR31","doi-asserted-by":"crossref","unstructured":"Muangkote N, Sunat K, Chiewchanwattana S (2014) An improved grey wolf optimizer for training q-gaussian radial basis functional-link nets. In: Proc of international conference on computer science and engineering, pp 209\u2013214","DOI":"10.1109\/ICSEC.2014.6978196"},{"key":"6155_CR32","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1016\/j.dsp.2010.02.003","volume":"20","author":"A Nissar","year":"2010","unstructured":"Nissar A, Mir A (2010) Classification of steganalysis techniques: a study. Digital Signal Process 20:1758\u20131770","journal-title":"Digital Signal Process"},{"key":"6155_CR33","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5:215\u2013224","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6155_CR34","doi-asserted-by":"crossref","unstructured":"Pevny\u0300 T, Fridrich J (2005) Towards multi-class blind steganalyzer for jpeg images. In: Proc of international workshop on digital watermarking, pp 39\u201353","DOI":"10.1007\/11551492_4"},{"key":"6155_CR35","doi-asserted-by":"crossref","unstructured":"Pevny T, Fridrich J (2007) Merging markov and dct features for multi-class jpeg steganalysis. In: Proc of electronic imaging, pp 650503\u2013650503","DOI":"10.1117\/12.696774"},{"key":"6155_CR36","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74:5861\u20135872","journal-title":"Multimedia Tools and Applications"},{"key":"6155_CR37","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23:1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6155_CR38","doi-asserted-by":"crossref","unstructured":"Ramezani M, Ghaemmaghami S (2010) Towards genetic feature selection in image steganalysis. In: Proc of IEEE consumer communications and networking conference, pp 1\u20134","DOI":"10.1109\/CCNC.2010.5421805"},{"key":"6155_CR39","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) Gsa: a gravitational search algorithm. Inform Sci 179:2232\u20132248","journal-title":"Inform Sci"},{"key":"6155_CR40","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s11517-014-1200-8","volume":"52","author":"M Saraswat","year":"2014","unstructured":"Saraswat M, Arya K (2014) Feature selection and classification of leukocytes using random forest. Med Biol Eng Comput 52:1041\u20131052","journal-title":"Med Biol Eng Comput"},{"key":"6155_CR41","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.swevo.2013.02.003","volume":"11","author":"M Saraswat","year":"2013","unstructured":"Saraswat M, Arya K, Sharma H (2013) Leukocyte segmentation in tissue images using differential evolution algorithm. Swarm Evol Comput 11:46\u201354","journal-title":"Swarm Evol Comput"},{"key":"6155_CR42","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1007\/s00521-011-0729-9","volume":"21","author":"M Sheikhan","year":"2012","unstructured":"Sheikhan M, Pezhmanpour M, Moin MS (2012) Improved contourlet-based steganalysis using binary particle swarm optimization and radial basis neural networks. Neural Comput & Applic 21:1717\u20131728","journal-title":"Neural Comput & Applic"},{"key":"6155_CR43","volume-title":"Evolutionary optimization algorithms","author":"D Simon","year":"2013","unstructured":"Simon D (2013) Evolutionary optimization algorithms. Wiley, Hoboken"},{"key":"6155_CR44","volume-title":"Nature-inspired optimization algorithms","author":"X-S Yang","year":"2014","unstructured":"Yang X-S (2014) Nature-inspired optimization algorithms. Elsevier, New York"},{"key":"6155_CR45","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/4235.771163","volume":"3","author":"X Yao","year":"1999","unstructured":"Yao X, Liu Y, Lin G (1999) Evolutionary programming made faster. IEEE Trans Evol Comput 3:82\u2013102","journal-title":"IEEE Trans Evol Comput"},{"key":"6155_CR46","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1016\/S0165-1684(03)00169-5","volume":"83","author":"T Zhang","year":"2003","unstructured":"Zhang T, Ping X (2003) A new approach to reliable detection of lsb steganography in natural images. Signal Process 83:2085\u20132093","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6155-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6155-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6155-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T08:48:49Z","timestamp":1561452529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6155-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["6155"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6155-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"24 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}