{"id":"https://openalex.org/W2005288144","doi":"https://doi.org/10.1109/tifs.2009.2025841","title":"Steganalysis of YASS","display_name":"Steganalysis of YASS","publication_year":2009,"publication_date":"2009-07-01","ids":{"openalex":"https://openalex.org/W2005288144","doi":"https://doi.org/10.1109/tifs.2009.2025841","mag":"2005288144"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2025841","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"None Bin Li","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110380607","display_name":"Jiwu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"None Jiwu Huang","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112253415","display_name":"Yun Q. Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"None Yun Qing Shi","raw_affiliation_strings":["Department of Electronic and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electronic and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.89,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":41,"citation_normalized_percentile":{"value":0.918284,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"4","issue":"3","first_page":"369","last_page":"382"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.94953203},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.547908}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.94953203},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.85947347},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.819656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7463443},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5906833},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5060727},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.50444496},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4974003},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43233255},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41415614},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41411978},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40643236},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.392637},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37079573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26983172},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24373719},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.13690606},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2025841","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":43,"referenced_works":["https://openalex.org/W1512190422","https://openalex.org/W1518402653","https://openalex.org/W1527181506","https://openalex.org/W1534147215","https://openalex.org/W1535817554","https://openalex.org/W1536019179","https://openalex.org/W1760530029","https://openalex.org/W1765283245","https://openalex.org/W1806317803","https://openalex.org/W1875845630","https://openalex.org/W1972785987","https://openalex.org/W2018576906","https://openalex.org/W2020368068","https://openalex.org/W2027036734","https://openalex.org/W2032480392","https://openalex.org/W2040903332","https://openalex.org/W2041985330","https://openalex.org/W2049562124","https://openalex.org/W2061395358","https://openalex.org/W2064123268","https://openalex.org/W2068740952","https://openalex.org/W2070040249","https://openalex.org/W2084641094","https://openalex.org/W2104318095","https://openalex.org/W2106726851","https://openalex.org/W2107465879","https://openalex.org/W2111280862","https://openalex.org/W2113267006","https://openalex.org/W2116997076","https://openalex.org/W2117500881","https://openalex.org/W2133743319","https://openalex.org/W2137040818","https://openalex.org/W2137813581","https://openalex.org/W2142604419","https://openalex.org/W2143264331","https://openalex.org/W2145564677","https://openalex.org/W2148367481","https://openalex.org/W2148610715","https://openalex.org/W2155485695","https://openalex.org/W2164789387","https://openalex.org/W2167999072","https://openalex.org/W3146003712","https://openalex.org/W4298266977"],"related_works":["https://openalex.org/W4309385482","https://openalex.org/W4243922849","https://openalex.org/W2939392096","https://openalex.org/W2792878404","https://openalex.org/W2182496537","https://openalex.org/W2148973528","https://openalex.org/W2106726851","https://openalex.org/W2068740952","https://openalex.org/W1716757876","https://openalex.org/W1583147569"],"abstract_inverted_index":{"A":[0],"promising":[1],"steganographic":[2,230],"method-yet":[3],"another":[4],"steganography":[5],"scheme":[6,94],"(YASS)-was":[7],"designed":[8],"to":[9,21,39,47,66,103,121,173,184],"resist":[10],"blind":[11],"steganalysis":[12,215],"via":[13],"embedding":[14,51,81,93,166,194,220],"data":[15,50],"in":[16,31,45,158,188,226],"randomized":[17,88],"locations.":[18],"In":[19,55,168],"addition":[20],"a":[22,34,73,100,112,119,182,185,208,228],"concrete":[23],"realization":[24],"which":[25,108,126,189],"is":[26,77,109,134,196,212],"named":[27],"the":[28,42,49,58,80,91,105,123,140,143,152,160,175,190,193,204,219],"YASS":[29,43,59,85,92,106,144,161,179,202],"algorithm":[30,44,60,145,162],"this":[32,56],"paper,":[33],"few":[35],"strategies":[36,177],"were":[37],"proposed":[38,132,205],"work":[40],"with":[41],"order":[46],"enhance":[48],"rate":[52],"and":[53,61,90,163,180,216],"security.":[54],"work,":[57],"these":[62],"strategies,":[63],"together":[64],"referred":[65],"as":[67],"YASS,":[68],"have":[69,154],"been":[70],"analyzed":[71],"from":[72,125,151],"warden's":[74],"perspective.":[75],"It":[76],"observed":[78],"that":[79,218],"locations":[82,195,221],"chosen":[83],"by":[84,111,203],"are":[86,129,222],"not":[87,135],"enough":[89],"causes":[95],"detectable":[96],"artifacts.":[97],"We":[98],"present":[99],"steganalytic":[101,115,127],"method":[102,206],"attack":[104],"algorithm,":[107],"facilitated":[110],"specifically":[113],"selected":[114,210],"observation":[116],"domain":[117,124,141],"(SO-domain),":[118],"term":[120],"define":[122],"features":[128,149],"extracted.":[130],"The":[131,198],"SO-domain":[133,153,211],"exactly,":[136],"but":[137],"partially":[138],"accesses,":[139],"where":[142],"embeds":[146],"data.":[147],"Statistical":[148],"generated":[150],"demonstrated":[155],"high":[156],"effectiveness":[157],"detecting":[159,201],"identifying":[164],"some":[165],"parameters.":[167],"addition,":[169],"we":[170],"discuss":[171],"how":[172],"defeat":[174],"above-mentioned":[176],"of":[178,192,200,223],"demonstrate":[181],"countermeasure":[183],"new":[186],"case":[187],"randomness":[191],"enhanced.":[197],"success":[199],"indicates":[207],"properly":[209],"beneficial":[213],"for":[214],"confirms":[217],"great":[224],"importance":[225],"designing":[227],"secure":[229],"scheme.":[231]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2005288144","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2024-11-23T12:20:56.836894","created_date":"2016-06-24"}