{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:53:29Z","timestamp":1725429209203},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1016\/j.sigpro.2021.108015","type":"journal-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T16:36:56Z","timestamp":1611765416000},"page":"108015","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":25,"special_numbering":"C","title":["Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography"],"prefix":"10.1016","volume":"183","author":[{"given":"Liyan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Chunfang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sigpro.2021.108015_bib0001","series-title":"Digital Image Processing","first-page":"539","volume":"8","author":"Gonzalez","year":"2018"},{"key":"10.1016\/j.sigpro.2021.108015_sbref0002","series-title":"Proceedings of Code 2019. San Francisco, California, America","article-title":"Internet trends 2019","author":"Meeker","year":"2019"},{"issue":"2","key":"10.1016\/j.sigpro.2021.108015_bib0003","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MMUL.2017.38","article-title":"JPEG at 25: still going strong","volume":"24","author":"Hudson","year":"2017","journal-title":"IEEE Multimed."},{"issue":"10","key":"10.1016\/j.sigpro.2021.108015_bib0004","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/83.869177","article-title":"A mathematical analysis of the DCT coefficient distributions for images","volume":"9","author":"Lam","year":"2000","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.sigpro.2021.108015_bib0005","series-title":"Proceedings of The International Society for Optics and Photonics (SPIE \u201996)","first-page":"403","article-title":"DCT coefficient distributions","volume":"2657","author":"Smoot","year":"1996"},{"key":"10.1016\/j.sigpro.2021.108015_bib0006","series-title":"Proceedings of The Thirtieth Asilomar Conference on Signals, Systems and Computers","first-page":"601","article-title":"Statistical analysis of the DCT coefficients and their quantization error","volume":"1","author":"Yovanof","year":"1997"},{"issue":"2","key":"10.1016\/j.sigpro.2021.108015_bib0007","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","article-title":"Detection of double-compression in JPEG images for applications in steganography","volume":"3","author":"Pevny","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.sigpro.2021.108015_bib0008","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","article-title":"Image forgery localization via block-grained analysis of JPEG artifacts","volume":"7","author":"Bianchi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2021.108015_bib0009","series-title":"Proceedings of the 5th IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI \u201902). Sante Fe, NM, USA","first-page":"158-162","article-title":"Fast and robust watermarking of JPEG files","author":"Luo","year":"2002"},{"issue":"3","key":"10.1016\/j.sigpro.2021.108015_bib0010","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","article-title":"A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation","volume":"68","author":"Das","year":"2014","journal-title":"Int. J. Electron. Commun."},{"key":"10.1016\/j.sigpro.2021.108015_bib0011","series-title":"Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES \u201915). Toulouse, France","first-page":"461","article-title":"A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients","author":"Zhang","year":"2015"},{"issue":"2","key":"10.1016\/j.sigpro.2021.108015_bib0012","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","article-title":"Towards robust image steganography","volume":"29","author":"Tao","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"10.1016\/j.sigpro.2021.108015_bib0013","doi-asserted-by":"crossref","first-page":"1933-1942","DOI":"10.1109\/TIFS.2014.2359368","article-title":"An effective method for detecting double JPEG compression with the same quantization matrix","volume":"9","author":"Yang","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"10.1016\/j.sigpro.2021.108015_bib0014","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TIFS.2014.2330312","article-title":"First quantization matrix estimation from double compressed JPEG images","volume":"9","author":"Galvan","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.sigpro.2021.108015_bib0015","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","article-title":"A robust image authentication method distinguishing JPEG compression from malicious manipulation","volume":"11","author":"Lin","year":"2001","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2021.108015_bib0016","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","article-title":"Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing","volume":"53","author":"Parah","year":"2016","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.sigpro.2021.108015_bib0017","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","article-title":"Robust and blind image watermarking in DCT domain using inter-block coefficient correlation","volume":"517","author":"Ko","year":"2020","journal-title":"Inf. Sci."},{"key":"10.1016\/j.sigpro.2021.108015_bib0018","doi-asserted-by":"crossref","first-page":"119506","DOI":"10.1109\/ACCESS.2019.2926226","article-title":"An adaptive JPEG double compression steganographic scheme based on irregular DCT coefficients distribution","volume":"7","author":"Jia","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.sigpro.2021.108015_bib0019","doi-asserted-by":"crossref","first-page":"3649","DOI":"10.1007\/s11042-016-3914-0","article-title":"Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection","volume":"76","author":"Zhang","year":"2017","journal-title":"Multimed. Tools Appl."},{"issue":"14","key":"10.1016\/j.sigpro.2021.108015_bib0020","doi-asserted-by":"crossref","first-page":"17913","DOI":"10.1007\/s11042-017-4506-3","article-title":"Dither modulation based adaptive steganography resisting JPEG compression and statistic detection","volume":"77","author":"Zhang","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2021.108015_bib0021","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","article-title":"On the fault-tolerant performance for a class of robust image steganography","volume":"146","author":"Zhang","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2021.108015_bib0022","article-title":"Multiple robustness enhancements for image adaptive steganography in lossy channels","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"10.1016\/j.sigpro.2021.108015_bib0023","doi-asserted-by":"crossref","first-page":"1843","DOI":"10.1109\/TIFS.2018.2885438","article-title":"Improving the robustness of adaptive steganographic algorithms based on transport channel matching","volume":"14","author":"Zhao","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2021.108015_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107454","article-title":"Anti-compression JPEG steganography over repetitive compression networks","volume":"170","author":"Li","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2021.108015_bib0025","series-title":"Proceedings of 13th International Conference on Information Hiding (IH \u201911). Prague, Czech Republic.","first-page":"488","article-title":"\u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS","volume":"96","author":"Bas","year":"2011"},{"key":"10.1016\/j.sigpro.2021.108015_bib0026","series-title":"Proceedings of International Society for Optical Engineering (SPIE \u201904)","first-page":"472","article-title":"UCID: An uncompressed color image database","volume":"5307","author":"Schaefer","year":"2004"},{"key":"10.1016\/j.sigpro.2021.108015_bib0027","series-title":"Proceedings of 18th International Workshop on Digital-forensics and Watermarking (IWDW \u201919). Chengdu, China","article-title":"IStego100k: large-scale image steganalysis dataset","author":"Yang","year":"2019"},{"issue":"3","key":"10.1016\/j.sigpro.2021.108015_bib0028","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","volume":"6","author":"Filler","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2021.108015_bib0029","series-title":"Processings of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT \u201916). Limassol, Cyprus","first-page":"311","article-title":"Flexible image watermarking in JPEG domain","author":"Fallahpour","year":"2017"},{"key":"10.1016\/j.sigpro.2021.108015_bib0030","series-title":"Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security (IH and MMSec \u201913)","first-page":"59","article-title":"Digital steganography using universal distortion function","author":"Holub","year":"2013"},{"issue":"4","key":"10.1016\/j.sigpro.2021.108015_bib0031","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/TIFS.2008.2002936","article-title":"Multiclass detector of current steganographic methods for JPEG format","volume":"3","author":"Pevny","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.sigpro.2021.108015_bib0032","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","article-title":"Low complexity features for JPEG steganalysis using undecimated DCT","volume":"10","author":"Holub","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168421000542?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168421000542?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:44:29Z","timestamp":1711586669000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168421000542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":32,"alternative-id":["S0165168421000542"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2021.108015","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2021.108015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108015"}}