{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T21:16:26Z","timestamp":1721855786466},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,10,20]],"date-time":"2018-10-20T00:00:00Z","timestamp":1539993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Natural Science Foundation of Jilin Province","award":["61772572"]},{"name":"the Natural Science Foundation of Guangdong Province of China","award":["2017A030313366"]},{"name":"the Fundamental Research Funds for Central Universities","award":["17lgjc45"]},{"name":"the NSFC-NRF Scientific Cooperation Program","award":["61811540409"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6747-1","type":"journal-article","created":{"date-parts":[[2018,10,20]],"date-time":"2018-10-20T09:55:24Z","timestamp":1540029324000},"page":"8655-8665","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Designing adaptive JPEG steganography based on the statistical properties in spatial domain"],"prefix":"10.1007","volume":"78","author":[{"given":"Ge","family":"Liu","sequence":"first","affiliation":[]},{"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhonghua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"key":"6747_CR1","unstructured":"Bas P, Pevn\u00fd T (2011) Break our steganographic system: The ins and outs of organizing boss, Information Hiding, Springer, pp. 59\u201370"},{"key":"6747_CR2","doi-asserted-by":"crossref","unstructured":"Chen K, Zhang W, Zhou H, Yu N, Feng G (2016) Defining cost functions for adaptive steganography at the microscale. In: Proc. IEEE Workshop Inf. Forensics Secur., pp. 1\u20136","DOI":"10.1109\/WIFS.2016.7823900"},{"key":"6747_CR3","unstructured":"Crandall R (1998) Some notes on steganography. Steganography Mailing List [Online]. Available: http:\/\/os.inf.tu-dresden.de\/westfeld\/crandall.pdf , 1998"},{"issue":"3","key":"6747_CR4","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2010","unstructured":"Filler T, Judas J, Fridrich J (2010) Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Transactions on Information Forensics and Security 6(3):920\u2013935","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6747_CR5","first-page":"4","volume-title":"Perturbed quantization steganography with wet paper codes","author":"J Fridrich","year":"2004","unstructured":"Fridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. Proc. the ACM Workshop on Multimedia and Security, Magdeburg, pp 4\u201315"},{"issue":"1","key":"6747_CR6","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TIFS.2005.863487","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich J, Goljan M, Soukal D (2006) Wet paper codes with improved embedding efficiency. IEEE Trans Information Forensics and Security 1(1):102\u2013110","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"6747_CR7","first-page":"3","volume-title":"Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities","author":"J Fridrich","year":"2007","unstructured":"Fridrich J, Pevn\u00fd T, Kodovsk\u00fd J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. Proc. the ACM Workshop on Multimedia and Security, Dallas, pp 3\u201314"},{"issue":"5","key":"6747_CR8","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo L, Ni J, Shi YQ (2014) Uniform Embedding for Efficient JPEG Steganography. IEEE Trans Information Forensics and Security 9(5):814\u2013825","journal-title":"IEEE Trans Information Forensics and Security"},{"issue":"3","key":"6747_CR9","first-page":"873","volume":"4","author":"L Guo","year":"2015","unstructured":"Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans Information Forensics and Security 4(3):873\u2013884","journal-title":"IEEE Trans Information Forensics and Security"},{"issue":"2","key":"6747_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J]. IEEE Transactions on Information Forensics & Security 10(2):219\u2013228","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"6747_CR11","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, (Section: SI: Revised Selected Papers of ACM IH and MMS 2013)","DOI":"10.1186\/1687-417X-2014-1"},{"issue":"4","key":"6747_CR12","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"F Huang","year":"2012","unstructured":"Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Trans Information Forensics and Security 7(4):1181\u20131191","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"6747_CR13","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482517","volume-title":"Distortion Function Designing for JPEG Steganography with Uncompressed Side-image","author":"F Huang","year":"2013","unstructured":"Huang F, Luo W, Huang J, Shi YQ (2013) Distortion Function Designing for JPEG Steganography with Uncompressed Side-image. Proc. 1th ACM Information Hiding and Multimedia Security Workshop, Montpellier"},{"key":"6747_CR14","doi-asserted-by":"crossref","unstructured":"Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. In: Proc. Information Hiding, 8th International Workshop, Old Town Alexandria, Virginia, July 10\u201312, 2006, volume 4437 of Lecture Notes in Computer Science, pp. 314\u2013327","DOI":"10.1007\/978-3-540-74124-4_21"},{"issue":"2","key":"6747_CR15","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security 7(2):432\u2013444","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"6747_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P Sallee","year":"2005","unstructured":"Sallee P (2005) Model based methods for steganography and steganalysis. Int J Image Graphics 5(1):167\u2013190","journal-title":"Int J Image Graphics"},{"key":"6747_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-77370-2_2","volume-title":"Information Hiding","author":"Kaushal Solanki","year":"2007","unstructured":"Solanki K, Sarkar A, Manjunath BS (2007) YASS: Yet another steganographic scheme that resists blind steganalysis. In: Proc. Information Hiding, 9th International Workshop, Palais du Grand Large, Saint Malo, the corsair town, Brittany, volume 4567 of Lecture Notes in Computer Science, pp. 16\u201331"},{"key":"6747_CR18","doi-asserted-by":"crossref","unstructured":"Song X, Liu F, Yang C et al (2015) Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. The, ACM Workshop. ACM, pp. 15\u201323","DOI":"10.1145\/2756601.2756608"},{"key":"6747_CR19","first-page":"289","volume-title":"F5\u2014a steganographic algorithm. Information hiding","author":"A Westfeld","year":"2001","unstructured":"Westfeld A (2001) F5\u2014a steganographic algorithm. Information hiding. Springer, Berlin Heidelberg, pp 289\u2013302"},{"key":"6747_CR20","doi-asserted-by":"crossref","unstructured":"Zhang R, Sachnev V, Kim HJ (2009) Fast BCH syndrome coding for steganography. Proc. Information Hiding, 11th International Workshop, Darmstadt, volume 5806 of Lecture Notes in Computer Science, pp. 48\u201358","DOI":"10.1007\/978-3-642-04431-1_4"},{"issue":"11","key":"6747_CR21","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"6747_CR22","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TIFS.2009.2024720","volume":"4","author":"W Zhang","year":"2009","unstructured":"Zhang W, Wang X (2009) Generalization of the ZZW embedding construction for steganography. IEEE Trans Information Forensics and Security 4(3):564\u2013568","journal-title":"IEEE Trans Information Forensics and Security"},{"issue":"3","key":"6747_CR23","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1109\/TIT.2009.2039087","volume":"56","author":"W Zhang","year":"2010","unstructured":"Zhang W, Zhang X, Wang S (2010) Near-optimal codes for information embedding in gray-scale signals. IEEE Trans Information Forensics and Security 56(3):1262\u20131269","journal-title":"IEEE Trans Information Forensics and Security"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6747-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6747-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6747-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T17:05:06Z","timestamp":1605287106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6747-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,20]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6747"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6747-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,20]]},"assertion":[{"value":"26 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}