{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:02:57Z","timestamp":1725534177433},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872448","61772549","U1804263"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shanxi Province of China","award":["2018JM6017"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2021,12]]},"abstract":"Abstract<\/jats:title>The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload location method based on optimal estimation of cover co-frequency sub-image, which estimates the cover JPEG image based on the Markov model of co-frequency sub-image. The proposed method combines the coefficients of the same position in each 8 \u00d7 8 block in the JPEG image to obtain 64 co-frequency sub-images and then uses the maximum a posterior (MAP) probability algorithm to find the optimal estimations of cover co-frequency sub-images by the Markov model. Then, the residual of each DCT coefficient is obtained by computing the absolute difference between it and the estimated cover version of it, and the average residual over coefficients in the same position of multiple stego images embedded along the same path is used to estimate the stego position. The experimental results show that the proposed payload location method can significantly improve the locating accuracy of the stego positions in low frequencies.<\/jats:p>","DOI":"10.1186\/s13640-020-00542-2","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T17:13:16Z","timestamp":1609953196000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image"],"prefix":"10.1186","volume":"2021","author":[{"given":"Jie","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6487-379X","authenticated-orcid":false,"given":"Chunfang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ma","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuemeng","family":"Lian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"542_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C Qin","year":"2018","unstructured":"C. Qin, W. Zhang, F. Cao, X.P. Zhang, C.C. Chang, Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109\u2013122 (2018)","journal-title":"Signal Process."},{"key":"542_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Y. Zhang, C. Qin, W.M. Zhang, F.L. Liu, X.Y. Luo, On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99\u2013111 (2018)","journal-title":"Signal Process."},{"key":"542_CR3","doi-asserted-by":"publisher","unstructured":"X. Liao, Y.B. Yu, B. Li, Z.P. Li, Z. Qin, A new payload partition strategy in color image steganography. IEEE Trans. Circuits Syst. Video Technol. (2019) https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","DOI":"10.1109\/TCSVT.2019.2896270"},{"key":"542_CR4","doi-asserted-by":"publisher","unstructured":"Y. Zhang, X.Y. Luo, Y.Q. Guo, C. Qin, F.L. Liu, Multiple robustness enhancements for image adaptive steganography in lossy channels. IEEE Trans. Circuits Syst. Video Technol. (2019) https:\/\/doi.org\/10.1109\/TCSVT.2019.2923980","DOI":"10.1109\/TCSVT.2019.2923980"},{"issue":"3","key":"542_CR5","first-page":"541","volume":"55","author":"LY Xiang","year":"2018","unstructured":"L.Y. Xiang, Y. Li, W. Hao, P. Yang, X.B. Shen, Reversible natural language watermarking using synonym substitution and arithmetic coding. CMC 55(3), 541\u2013559 (2018)","journal-title":"CMC"},{"key":"542_CR6","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.sigpro.2017.03.019","volume":"58","author":"X Liao","year":"2017","unstructured":"X. Liao, Z. Qin, L.P. Ding, Data embedding in digital images using critical functions. Signal Process. 58, 146\u2013156 (2017)","journal-title":"Signal Process."},{"issue":"2","key":"542_CR7","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"B. Li, J. He, J. Huang, Y.Q. Shi, A survey on image steganography and steganalysis. J. Inf. Hiding Multimedia Signal Process. 2(2), 142\u2013172 (2011)","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"542_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03187-8","volume-title":"Innovations in digital watermarking techniques","author":"FH Wang","year":"2009","unstructured":"F.H. Wang, J.S. Pan, L.C. Jain, Innovations in digital watermarking techniques (Springer, Berlin-Heidelberg, 2009)"},{"issue":"2","key":"542_CR9","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"YY Ma","year":"2019","unstructured":"Y.Y. Ma, X.Y. Luo, X.L. Li, Z.K. Bao, Y. Zhang, Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans. Circuits Syst. Video Technol. 29(2), 336\u2013350 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"542_CR10","doi-asserted-by":"publisher","unstructured":"C.F. Yang, Y. Zhang, P. Wang, X.Y. Luo, F.L. Liu, J.C. Lu, Steganalysis feature subspace selection based on Fisher criterion. IEEE Int. Conf. Data Sci. Adv. Analytics., 514\u2013521 (2017) https:\/\/doi.org\/10.1109\/DSAA.2017.53","DOI":"10.1109\/DSAA.2017.53"},{"issue":"1","key":"542_CR11","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TIFS.2012.2229987","volume":"8","author":"CF Yang","year":"2013","unstructured":"C.F. Yang, F.L. Liu, X.Y. Luo, Y. Zeng, Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography. IEEE Trans. Inf. Forensics Secur. 8(1), 216\u2013228 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"542_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.32604\/cmc.2019.05242","volume":"59","author":"YH Kang","year":"2019","unstructured":"Y.H. Kang, F.L. Liu, C.F. Yang, X.Y. Luo, Zhang, T.T. Zhang, Color image steganalysis based on residuals of channel differences. Comput. Mater. Continua 59(1), 315\u2013329 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"542_CR13","first-page":"552","volume":"11","author":"XF Song","year":"2017","unstructured":"X.F. Song, F.L. Liu, L.J. Chen, C.F. Yang, X.Y. Luo, Optimal Gabor filters for steganalysis of content-adaptive JPEG steganography. KSII Trans. Internet Inf. Syst. 11(1), 552\u2013569 (2017)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"2","key":"542_CR14","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.3934\/mbe.2020055","volume":"17","author":"LY Xiang","year":"2019","unstructured":"L.Y. Xiang, G.Q. Guo, J.M. Yu, V.S. Sheng, P. Yang, A convolutional neural network-based linguistic steganalysis for synonym substitution steganography. Math. Biosci. Eng. 17(2), 1041\u20131058 (2019)","journal-title":"Math. Biosci. Eng."},{"key":"542_CR15","doi-asserted-by":"publisher","first-page":"119103","DOI":"10.1007\/s11432-017-9328-2","volume":"61","author":"CF Yang","year":"2018","unstructured":"C.F. Yang, X.Y. Luo, J.C. Lu, F.L. Liu, Extracting hidden messages of MLSB steganography based on optimal stego subset. SCIENCE CHINA Inf. Sci. 61, 119103 (2018) https:\/\/doi.org\/10.1007\/s11432-017-9328-2","journal-title":"SCIENCE CHINA Inf. Sci."},{"issue":"3","key":"542_CR16","doi-asserted-by":"publisher","first-page":"32105","DOI":"10.1007\/s11432-015-5367-x","volume":"59","author":"JF Liu","year":"2016","unstructured":"J.F. Liu, Y.G. Tian, T. Han, J.C. Wang, X.Y. Luo, Stego key searching for LSB steganography on JPEG decompressed image. SCIENCE CHINA Inf. Sci. 59(3), 32105 (2016)","journal-title":"SCIENCE CHINA Inf. Sci."},{"key":"542_CR17","first-page":"83030Q","volume-title":"Media Watermarking, Security, and Forensics","author":"TT Quach","year":"2012","unstructured":"T.T. Quach, in Media Watermarking, Security, and Forensics. Locatability of modified pixels in steganographic images (2012), p. 83030Q"},{"issue":"2","key":"542_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.32604\/cmc.2019.06154","volume":"60","author":"CF Yang","year":"2019","unstructured":"C.F. Yang, J. Wang, C.L. Lin, H.Q. Chen, W.J. Wang, Locating steganalysis of LSB matching based on spatial and wavelet filter fusion. Comput. Mater. Continua 60(2), 633\u2013644 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"542_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1411328.1411335","volume-title":"Proc. 10th Multimedia and Security Workshop","author":"AD Ker","year":"2008","unstructured":"A.D. Ker, in Proc. 10th Multimedia and Security Workshop. Locating steganographic payload via WS residuals (2008), pp. 27\u201332"},{"key":"542_CR20","first-page":"590","volume":"6297","author":"KL Chiew","year":"2010","unstructured":"K.L. Chiew, P. Josef, Identifying steganographic payload location in binary image. Proc. Pac. Rim Conf. Multimedia Part I. 6297, 590\u2013600 (2010)","journal-title":"Proc. Pac. Rim Conf. Multimedia Part I."},{"key":"542_CR21","first-page":"7254","volume-title":"Proceedings of SPIE- The International Society for Optical Engineering","author":"AD Ker","year":"2009","unstructured":"A.D. Ker, I. Lubenko, in Proceedings of SPIE- The International Society for Optical Engineering. Feature reduction and payload location with WAM steganalysis (2009), p. 7254"},{"issue":"4","key":"542_CR22","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TIFS.2011.2160855","volume":"6","author":"TT Quach","year":"2011","unstructured":"T.T. Quach, Optimal cover estimation methods and steganographic payload location. IEEE Trans. Inf. Forensics Secur. 6(4), 1214\u20131222 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"542_CR23","doi-asserted-by":"crossref","unstructured":"T.T. Quach, Cover estimation and payload location using Markov random fields. Media Watermarking Secur. Forensics., 90280H (2014)","DOI":"10.1117\/12.2032711"},{"key":"542_CR24","first-page":"1125","volume-title":"Proceedings of the 19th IEEE International Conference on Image Processing","author":"XL Gui","year":"2012","unstructured":"X.L. Gui, X.L. Li, B. Yang, in Proceedings of the 19th IEEE International Conference on Image Processing. Improved payload location for LSB matching steganography (2012), pp. 1125\u20131128"},{"key":"542_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.dsp.2014.12.004","volume":"38","author":"JF Liu","year":"2015","unstructured":"J.F. Liu, Y.G. Tian, T. Han, C.F. Yang, W.B. Liu, LSB steganographic payload location for JPEG decompressed images. Digit Signal Process. 38, 66\u201376 (2015)","journal-title":"Digit Signal Process."},{"issue":"3","key":"542_CR26","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11554-019-00849-y","volume":"16","author":"Y Sun","year":"2019","unstructured":"Y. Sun, H. Zhang, T. Zhang, R. Wang, Deep neural networks for efficient steganographic payload location. Real-Time Image Process. 16(3), 635\u2013647 (2019)","journal-title":"Real-Time Image Process."},{"key":"542_CR27","doi-asserted-by":"publisher","unstructured":"J. Wang, C.F. Yang, P. Wang, X.F. Song, J.C. Lu, Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distributed Sens. Netw. 16(1) (2020) https:\/\/doi.org\/10.1177\/1550147719899569","DOI":"10.1177\/1550147719899569"},{"key":"542_CR28","doi-asserted-by":"publisher","first-page":"35305","DOI":"10.1109\/ACCESS.2018.2847037","volume":"6","author":"LY Xiang","year":"2018","unstructured":"L.Y. Xiang, G.H. Zhao, Q. Li, W. Hao, F. Li, TUMK-ELM: a fast unsupervised heterogeneous data learning approach. IEEE Access. 6, 35305\u201335315 (2018)","journal-title":"IEEE Access."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00542-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-020-00542-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00542-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T18:59:28Z","timestamp":1609959568000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00542-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["542"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00542-2","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"1 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1"}}