{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T19:49:00Z","timestamp":1649015340893},"reference-count":20,"publisher":"International Academy Publishing (IAP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.3.731-736","type":"journal-article","created":{"date-parts":[[2013,3,6]],"date-time":"2013-03-06T23:03:26Z","timestamp":1362611006000},"source":"Crossref","is-referenced-by-count":1,"title":["Fusion of Two Typical Quantitative Steganalysis Based on SVR"],"prefix":"10.17706","volume":"8","author":[{"given":"Chunfang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Fenlin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,3,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0100-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(03)00169-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.812753"},{"issue":"no. 3","key":"ref4","first-page":"455","article-title":"Universal methodology for developing quantitative steganalysis","volume":"18","author":"Guo","year":"2009","unstructured":"[13] Y. Guo, X. Kong, X. You, and L. Li, \"Universal methodology for developing quantitative steganalysis,\" Chinese Journal of Electronics, vol. 18, no. 3, pp. 455\u2013459, 2009.","journal-title":"Chinese Journal of Electronics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.897265"},{"key":"ref6","first-page":"633","article-title":"Error correction of sample pair analysis based on support vector regression","volume-title":"Proc of the 3rd International Conference on Multimedia Information Networking and Security","author":"Yang","year":"2011","unstructured":"[17] C. Yang, F. Liu, and X. Luo, \"Error correction of sample pair analysis based on support vector regression,\" in Proc. of the 3rd International Conference on Multimedia Information Networking and Security. Shanghai, China: IEEE, November 2011, pp. 633\u2013636."},{"issue":"no. 10","key":"ref7","doi-asserted-by":"crossref","first-page":"2479","DOI":"10.4304\/jcp.7.10.2479-2487","article-title":"Multi-feature fusion face recognition based on kernel discriminate local preserve projection algorithm under smart environment","volume":"7","author":"Wu","year":"2012","unstructured":"[18] D. Wu, J. Cao, J. Wang, and W. Li, \"Multi-feature fusion face recognition based on kernel discriminate local preserve projection algorithm under smart environment,\" Journal of Computer, vol. 7, no. 10, pp. 2479\u20132487, 2012.","journal-title":"Journal of Computer"},{"issue":"no. 10","key":"ref8","doi-asserted-by":"crossref","first-page":"2593","DOI":"10.4304\/jcp.7.10.2593-2598","article-title":"Multi-satellite monitoring sst data fusion based on the adaptive threshold clustering algorithm","volume":"7","author":"Shi","year":"2012","unstructured":"[19] H. Shi, H. Dong, L. Xu, C. Song, F. Zhong, and R. Su, \"Multi-satellite monitoring sst data fusion based on the adaptive threshold clustering algorithm,\" Journal of Computer, vol. 7, no. 10, pp. 2593\u20132598, 2012.","journal-title":"Journal of Computer"},{"issue":"no. 3","key":"ref9","first-page":"634","article-title":"\"Image universal steganalysis based on best wavelet packet decomposition,\" Science China","volume":"53","author":"Luo","year":"2010","unstructured":"[20] X. Luo, F. Liu, C. Yang, and D. Wang, \"Image universal steganalysis based on best wavelet packet decomposition,\" Science China: Information Science, vol. 53, no. 3, pp. 634\u2013647, 2010.","journal-title":"Inf Sci","ISSN":"http:\/\/id.crossref.org\/issn\/0020-0255","issn-type":"print"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[1] J. Fridrich and M. Golijan, \"Practical steganalysis of digital images\u2014state of the art,\" in Proc. of the SPIE, Security and Watermarking of Multimedia Contents IV, SPIE 4675. San Jose, California: SPIE, Bellingham, Washington, 21 January 2002, pp. 1\u201313.","DOI":"10.1117\/12.465263"},{"key":"ref9","unstructured":"[2] S. Lian, D. Kanellopoulos, and G. Ruffo, \"Recent advances in multimedia information system security,\" Informatica, Slovenian, Tech. Rep. 1, 2009."},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[3] S. Lian and Y. Zhang, Handbook of Research on Secure Multimedia Distribution. Hershey, Pennsylvania: IGI Global (formerly Idea Group, Inc), 2009.","DOI":"10.4018\/978-1-60566-262-6"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[4] J. Fridrich, M. Golijan, and D. Soukal, \"Searching for the stego-key,\" in Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE 5306. San Jose, California: SPIE, Bellingham, Washington, 18- 22 January 2004, pp. 70\u201382.","DOI":"10.1117\/12.521353"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[5] J. Fridrich, M. Golijan, D. Soukal, and T. Holotyak, \"Forensic steganalysis: determining the stego key in spatial domain steganography,\" in Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, SPIE 5681. San Jose, California: SPIE, Bellingham, Washington, 17-21 January 2005, pp. 631\u2013642.","DOI":"10.1117\/12.585987"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[7] A. D. Ker, \"Locating steganographic payload via ws residual,\" in Proc. of the Workshop on Multimedia and Security. Oxford, United Kingdom: ACM, New York, NY, 22-23 September 2008, pp. 27\u201332.","DOI":"10.1145\/1411328.1411335"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[8] J. Fridrich, M. Golijan, and R. Du, \"Reliable detection of lsb steganography in color and grayscale images,\" in Proc. of the Workshop on Multimedia and Security. Ottawa, Ontario, Canada: ACM, New York, NY, 5 October 2001, pp. 27\u201330.","DOI":"10.1145\/1232454.1232466"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[11] J. Fridrich and M. Golijan, \"On estimation of secret message length in lsb steganography in spatial domain,\" in Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE 5306. San Jose, California: SPIE, Bellingham, Washington, 18-22 January 2004, pp. 23\u201334.","DOI":"10.1117\/12.521350"},{"key":"ref9","unstructured":"[12] T. Pevn\u2019y, J. Fridrich, and A. D. Ker, \"From blind to quantitative steganalysis,\" in Proc. of the SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, SPIE 7254. San Jose, California: SPIE, Bellingham, Washington, January 2002, pp. 0C01\u20130C14."},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[14] R. B\u00a8ohme, \"Assessment of steganalytic methods using multiple regression models,\" in Proc. of the 7th Workshop on Information Hiding, LNCS 3727. Barcelona, Spain: Springer Verlag, Berlin, June 2005, pp. 278\u2013295.","DOI":"10.1007\/11558859_21"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"[15] R. B\u00a8ohme and A. D. Ker, \"A two-factor error model for quantitative steganalysis,\" in Proc. of the SPIE, Security, Steganography and Watermarking of Multimedia Contents VIII, SPIE 6072. San Jose, California: SPIE, Bellingham, Washington, 16-19 January 2006, pp. 59\u201374.","DOI":"10.1117\/12.643701"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T09:15:09Z","timestamp":1644484509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/8270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,1]]},"references-count":20,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2013,3,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.3.731-736","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,3,1]]}}}