{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T18:29:26Z","timestamp":1724869766270},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202507","U1936212","U22A2030"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M703767"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2022A1515011209"],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1016\/j.sigpro.2023.109370","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T16:33:59Z","timestamp":1703781239000},"page":"109370","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["An efficient distortion cost function design for image steganography in spatial domain using quaternion representation"],"prefix":"10.1016","volume":"219","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6737-9498","authenticated-orcid":false,"given":"Qingliang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenkang","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7520-9031","authenticated-orcid":false,"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Xianglei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sigpro.2023.109370_b1","first-page":"161","article-title":"Using high-dimensional image models to perform highly undetectable steganography","volume":"vol. LNC 6387","author":"Pevny","year":"2010"},{"key":"10.1016\/j.sigpro.2023.109370_b2","series-title":"2012 IEEE International Workshop on Information Forensics and Security","first-page":"234","article-title":"Designing steganographic distortion using directional filters","author":"Holub","year":"2012"},{"issue":"1","key":"10.1016\/j.sigpro.2023.109370_b3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","article-title":"Universal distortion function for steganography in an arbitrary domain","volume":"2014","author":"Holub","year":"2014","journal-title":"EURASIP J. Inf. Secur."},{"key":"10.1016\/j.sigpro.2023.109370_b4","series-title":"2014 IEEE International Conference on Image Processing","first-page":"4206","article-title":"A new cost function for spatial image steganography","author":"Li","year":"2014"},{"issue":"3","key":"10.1016\/j.sigpro.2023.109370_b5","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1109\/TCSVT.2020.3001122","article-title":"Image steganography with symmetric embedding using Gaussian Markov random field model","volume":"31","author":"Su","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2023.109370_b6","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/TIFS.2019.2922229","article-title":"An embedding cost learning framework using GAN","volume":"15","author":"Yang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2023.109370_b7","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","article-title":"An automatic cost learning framework for image steganography using deep reinforcement learning","volume":"16","author":"Tang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2023.109370_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108319","article-title":"New design paradigm of distortion cost function for efficient JPEG steganography","volume":"190","author":"Su","year":"2022","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2023.109370_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2022.108908","article-title":"Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)","volume":"206","author":"Setiadi","year":"2023","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2023.109370_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2022.108813","article-title":"A novel gradient-guided post-processing method for adaptive image steganography","volume":"203","author":"Xie","year":"2023","journal-title":"Signal Process."},{"issue":"12","key":"10.1016\/j.sigpro.2023.109370_b11","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","article-title":"Using statistical image model for JPEG steganography: Uniform embedding revisited","volume":"10","author":"Guo","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10.1016\/j.sigpro.2023.109370_b12","doi-asserted-by":"crossref","first-page":"3545","DOI":"10.1109\/TCSVT.2018.2865537","article-title":"A new distortion function design for JPEG steganography using the generalized uniform embedding strategy","volume":"28","author":"Su","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"10.1016\/j.sigpro.2023.109370_b13","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/LSP.2018.2818674","article-title":"Efficient JPEG steganography using domain transformation of embedding entropy","volume":"25","author":"Hu","year":"2018","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"10.1016\/j.sigpro.2023.109370_b14","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TCSVT.2021.3115600","article-title":"Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge","volume":"32","author":"Tang","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"10.1016\/j.sigpro.2023.109370_b15","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","volume":"6","author":"Filler","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"10.1016\/j.sigpro.2023.109370_b16","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TIFS.2014.2326954","article-title":"Investigation on cost assignment in spatial image steganography","volume":"9","author":"Li","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.sigpro.2023.109370_b17","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","article-title":"Steganalysis by subtractive pixel adjacency matrix","volume":"5","author":"Pevny","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"13","key":"10.1016\/j.sigpro.2023.109370_b18","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1016\/j.patrec.2011.06.028","article-title":"Quaternionic wavelets for texture classification","volume":"32","author":"Soulard","year":"2011","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.sigpro.2023.109370_b19","doi-asserted-by":"crossref","first-page":"350","DOI":"10.14429\/dsj.64.4503","article-title":"A quaternionic wavelet transform-based approach for object recognition","volume":"64","author":"Priyadharshini","year":"2014","journal-title":"Def. Sci. J."},{"issue":"7","key":"10.1016\/j.sigpro.2023.109370_b20","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TIP.2008.924282","article-title":"Coherent multiscale image processing using dual-tree quaternion wavelets","volume":"17","author":"Wai Lam","year":"2008","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"10.1016\/j.sigpro.2023.109370_b21","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TIP.2006.884955","article-title":"Hypercomplex Fourier transforms of color images","volume":"16","author":"Ell","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.sigpro.2023.109370_b22","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.sigpro.2019.07.005","article-title":"Phase demodulation with iterative Hilbert transform embeddings","volume":"165","author":"Gengel","year":"2019","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2023.109370_b23","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.sigpro.2018.10.007","article-title":"An effective vector filter for impulse noise reduction based on adaptive quaternion color distance mechanism","volume":"155","author":"Jin","year":"2019","journal-title":"Signal Process."},{"issue":"5","key":"10.1016\/j.sigpro.2023.109370_b24","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TCSVT.2012.2207272","article-title":"Quaternion-based impulse noise removal from color video sequences","volume":"23","author":"Jin","year":"2013","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"10.1016\/j.sigpro.2023.109370_b25","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","article-title":"Content-adaptive steganography by minimizing statistical detectability","volume":"11","author":"Sedighi","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.sigpro.2023.109370_b26","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2023.109370_b27","series-title":"2014 IEEE International Workshop on Information Forensics and Security","first-page":"48","article-title":"Selection-channel-aware rich model for steganalysis of digital images","author":"Denemark","year":"2015"},{"issue":"5","key":"10.1016\/j.sigpro.2023.109370_b28","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","article-title":"Deep residual network for steganalysis of digital images","volume":"14","author":"Boroumand","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2023.109370_b29","series-title":"Hypercomplex Spectral Signal Representations for the Processing and Analysis of Images","author":"B\u00fclow","year":"1999"},{"key":"10.1016\/j.sigpro.2023.109370_b30","series-title":"Proceedings of SPIE - The International Society for Optical Engineering, Vol. 6819","article-title":"Revisiting weighted stego-image steganalysis","author":"Ker","year":"2008"},{"key":"10.1016\/j.sigpro.2023.109370_b31","series-title":"2011 IEEE International Workshop on Information Forensics and Security","first-page":"59","article-title":"Break our steganographic system: The Ins and outs of organizing BOSS","author":"Bas","year":"2011"},{"issue":"2","key":"10.1016\/j.sigpro.2023.109370_b32","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","article-title":"Ensemble classifiers for steganalysis of digital media","volume":"7","author":"Kodovsky","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168423004449?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168423004449?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T13:33:57Z","timestamp":1713447237000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168423004449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":32,"alternative-id":["S0165168423004449"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2023.109370","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An efficient distortion cost function design for image steganography in spatial domain using quaternion representation","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2023.109370","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"109370"}}