{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:54:49Z","timestamp":1742806489584,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T00:00:00Z","timestamp":1659398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872448"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shanxi Province of China","award":["2021JQ-379"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11042-022-13525-4","type":"journal-article","created":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T09:07:20Z","timestamp":1659431240000},"page":"36453-36472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6409-8401","authenticated-orcid":false,"given":"Xiaofeng","family":"Song","sequence":"first","affiliation":[]},{"given":"Chunfang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Han","sequence":"additional","affiliation":[]},{"given":"Shichang","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,2]]},"reference":[{"issue":"1","key":"13525_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TCSVT.2004.836745","volume":"15","author":"P Bao","year":"2005","unstructured":"Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circ Syst Video Technol 15(1):96\u2013102","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"13525_CR2","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break Our Steganographic System: The Ins and Outs of Organizing BOSS. In: Proceedings of the 13th International workshop on Information Hiding, Springer, pp 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"4","key":"13525_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443","journal-title":"IEEE Trans Inf Theory"},{"key":"13525_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","volume":"9","author":"X Chen","year":"2021","unstructured":"Chen X, Zhang Z, Qiu A, Xia Z, Xiong N (2021) A novel coverless steganography method based on image selection and StarGAN. IEEE Trans Netw Sci Eng 9:219\u2013230. https:\/\/doi.org\/10.1109\/TNSE.2020.3041529","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"1","key":"13525_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.32604\/csse.2019.34.023","volume":"34","author":"R Das","year":"2019","unstructured":"Das R, Baykara M, Tuna G (2019) A novel approach to steganography: enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. Comput Syst Sci Eng 34(1):23\u201332","journal-title":"Comput Syst Sci Eng"},{"issue":"1","key":"13525_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.acha.2007.09.003","volume":"25","author":"G Easley","year":"2008","unstructured":"Easley G, Labate D, Lim W (2008) Sparse directional image representations using the discrete shearlet transform. Appl Comput Harmon Anal 25(1):25\u201346","journal-title":"Appl Comput Harmon Anal"},{"issue":"3","key":"13525_CR7","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"13525_CR8","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensic Secur 9(5):814\u2013825","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"13525_CR9","doi-asserted-by":"crossref","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 59\u201368","DOI":"10.1145\/2482513.2482514"},{"issue":"2","key":"13525_CR10","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG Steganalysis using Undecimated DCT. IEEE Trans Inf Forensic Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"11","key":"13525_CR11","doi-asserted-by":"publisher","first-page":"13197","DOI":"10.1007\/s11042-017-4941-1","volume":"77","author":"X Kang","year":"2018","unstructured":"Kang X, Zhao F, Lin G, Chen Y (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed Tools Appl 77(11):13197\u201313224","journal-title":"Multimed Tools Appl"},{"key":"13525_CR12","doi-asserted-by":"crossref","unstructured":"Ker A D, Bas P, B\u00f6hme R, et al (2013). Moving steganography and Steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp. 45\u201358.","DOI":"10.1145\/2482513.2482965"},{"issue":"2","key":"13525_CR13","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"13525_CR14","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1109\/TCSVT.2020.3033945","volume":"31","author":"Y Luo","year":"2021","unstructured":"Luo Y, Qin J, Xiang X, Tan Y (2021) Coverless image steganography based on multi-object recognition. IEEE Trans Circ Syst Video Technol 31:2779\u20132791. https:\/\/doi.org\/10.1109\/TCSVT.2020.3033945","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"4","key":"13525_CR15","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","volume":"3","author":"T Pevny","year":"2008","unstructured":"Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Tran Inf Forensic Secur 3(4):635\u2013650","journal-title":"IEEE Tran Inf Forensic Secur"},{"key":"13525_CR16","doi-asserted-by":"crossref","unstructured":"Qian Z, Zhou H, Zhang W, Zhang X (2016) Robust steganography using texture synthesis. In: Proceedings of 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Springer, pp. 25\u201333","DOI":"10.1007\/978-3-319-50209-0_4"},{"issue":"2","key":"13525_CR17","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","volume":"29","author":"J Tao","year":"2019","unstructured":"Tao J, Li S, Zhang X, Wang Z (2019) Towards robust image steganography. IEEE Trans Circ Syst Video Technol 29(2):594\u2013600","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"11","key":"13525_CR18","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1007\/s11042-019-08530-z","volume":"79","author":"C Tian","year":"2020","unstructured":"Tian C, Wen R, Zou W, Gong L (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79(11):7515\u20137541","journal-title":"Multimed Tools Appl"},{"key":"13525_CR19","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.ins.2016.08.076","volume":"372","author":"X Wang","year":"2016","unstructured":"Wang X, Liu Y, Xu H, Wang A, Yang H (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634\u2013654","journal-title":"Inf Sci"},{"issue":"9","key":"13525_CR20","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.3390\/math8091558","volume":"8","author":"L Xiang","year":"2020","unstructured":"Xiang L, Yang S, Liu Y, Li Q, Zhu C (2020) Novel linguistic steganography based on character-level text generation. Mathematics 8(9):1558","journal-title":"Mathematics"},{"key":"13525_CR21","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"Z Yang","year":"2021","unstructured":"Yang Z, Zhang S, Hu Y, Hu Z, Huang Y (2021) VAE-Stega: linguistic steganography based on Variational auto-encoder. IEEE Trans Inf Forensic Secur 16:880\u2013895","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"13525_CR22","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/TIP.2009.2013082","volume":"18","author":"S Yi","year":"2009","unstructured":"Yi S, Labate D, Easley G, Krim H (2009) A Shearlet approach to edge analysis and detection. IEEE Trans Image Process 18(5):929\u2013941","journal-title":"IEEE Trans Image Process"},{"key":"13525_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2019.107343","volume":"168","author":"X Yu","year":"2020","unstructured":"Yu X, Chen K, Wang Y, Li W, Zhang W, Yu N (2020) Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process 168:1\u201312","journal-title":"Signal Process"},{"key":"13525_CR24","doi-asserted-by":"crossref","unstructured":"Zhang Y, Luo X, Yang C, Ye D, Liu F. (2015) A JPEG compression resistant adaptive steganography based on relative relationship between DCT coefficients. In: Proceedings of the 10th international conference on availability, Reliability and Security, IEEE, pp. 461\u201346.","DOI":"10.1109\/ARES.2015.53"},{"issue":"14","key":"13525_CR25","doi-asserted-by":"publisher","first-page":"17913","DOI":"10.1007\/s11042-017-4506-3","volume":"77","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zhu X, Qin C, Yang C, Luo X (2018) Dither modulation based adaptive steganography resisting JPEG compression and statistic detection. Multimed Tools Appl 77(14):17913\u201317935","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"13525_CR26","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1109\/TCSVT.2019.2923980","volume":"30","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Luo X, Guo Y, Qin C, Liu F (2020) Multiple robustness enhancements for image adaptive steganography in Lossy channels. IEEE Trans Circ Syst Video Technol 30(8):2750\u20132764","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"7","key":"13525_CR27","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1109\/TIFS.2018.2885438","volume":"14","author":"Z Zhao","year":"2019","unstructured":"Zhao Z, Guan Q, Zhang H, Zhao X (2019) Improving the robustness of adaptive steganographic algorithms based on transport channel matching. IEEE Trans Inf Forensic Secur 14(7):1843\u20131856","journal-title":"IEEE Trans Inf Forensic Secur"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13525-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13525-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T04:26:01Z","timestamp":1663993561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13525-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,2]]},"references-count":27,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["13525"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13525-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,8,2]]},"assertion":[{"value":"31 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}