{"id":"https://openalex.org/W2161226201","doi":"https://doi.org/10.1109/tifs.2010.2041826","title":"SVD-Based Universal Spatial Domain Image Steganalysis","display_name":"SVD-Based Universal Spatial Domain Image Steganalysis","publication_year":2010,"publication_date":"2010-02-17","ids":{"openalex":"https://openalex.org/W2161226201","doi":"https://doi.org/10.1109/tifs.2010.2041826","mag":"2161226201"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2041826","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009166868","display_name":"G\u00f6khan G\u00fcl","orcid":"https://orcid.org/0000-0003-2819-3222"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"funder","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Gokhan Gul","raw_affiliation_strings":["Sch. of Electron., Electr. Eng. & Comput. Sci., Queen's Univ. Belfast, , UK"],"affiliations":[{"raw_affiliation_string":"Sch. of Electron., Electr. Eng. & Comput. Sci., Queen's Univ. Belfast, , UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085690468","display_name":"Fatih Kurug\u00f6ll\u00fc","orcid":"https://orcid.org/0000-0002-2508-4496"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"funder","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Fatih Kurugollu","raw_affiliation_strings":["Sch. of Electron., Electr. Eng. & Comput. Sci., Queen's Univ. Belfast, , UK"],"affiliations":[{"raw_affiliation_string":"Sch. of Electron., Electr. Eng. & Comput. Sci., Queen's Univ. Belfast, , UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.675,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":73,"citation_normalized_percentile":{"value":0.953262,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"5","issue":"2","first_page":"349","last_page":"353"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9937,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9446169}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9446169},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8674898},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7213464},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.7036252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6409111},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.52758324},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.5241882},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5050178},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44848973},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4482298},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41138473},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3792154},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35617238}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2041826","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.76,"display_name":"Sustainable cities and communities"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1602715832","https://openalex.org/W1765283245","https://openalex.org/W1965392255","https://openalex.org/W1990135819","https://openalex.org/W2004686575","https://openalex.org/W2049562124","https://openalex.org/W2073251958","https://openalex.org/W2106726851","https://openalex.org/W2107689227","https://openalex.org/W2117500881","https://openalex.org/W2128124530","https://openalex.org/W2142604419","https://openalex.org/W2157248388","https://openalex.org/W3161625325","https://openalex.org/W97736718"],"related_works":["https://openalex.org/W4309385482","https://openalex.org/W4243922849","https://openalex.org/W3154843532","https://openalex.org/W2939392096","https://openalex.org/W2930153478","https://openalex.org/W2182496537","https://openalex.org/W2148973528","https://openalex.org/W2106726851","https://openalex.org/W2068740952","https://openalex.org/W1716757876"],"abstract_inverted_index":{"This":[0],"paper":[1],"is":[2],"concerned":[3],"with":[4,62],"the":[5,54,74,78,89],"universal":[6],"(blind)":[7],"image":[8,30],"steganalysis":[9],"problem":[10],"and":[11,40],"introduces":[12],"a":[13,46],"novel":[14,55],"method":[15,56,79],"to":[16,80],"detect":[17,81],"especially":[18],"spatial":[19,68],"domain":[20,69],"steganographic":[21],"methods.":[22],"The":[23],"proposed":[24],"steganalyzer":[25],"models":[26],"linear":[27],"dependencies":[28],"of":[29,67,77],"rows/columns":[31],"in":[32,65],"local":[33],"neighborhoods":[34],"using":[35],"singular":[36],"value":[37],"decomposition":[38],"transform":[39],"employs":[41],"content":[42],"independency":[43],"provided":[44],"by":[45],"Wiener":[47],"filtering":[48],"process.":[49],"Experimental":[50],"results":[51],"show":[52],"that":[53],"has":[57],"superior":[58],"performance":[59],"when":[60],"compared":[61],"its":[63],"counterparts":[64],"terms":[66],"steganography.":[70],"Experiments":[71],"also":[72],"demonstrate":[73],"reasonable":[75],"ability":[76],"discrete":[82],"cosine":[83],"transform-based":[84],"steganography":[85],"as":[86,88],"well":[87],"perturbation":[90],"quantization":[91],"method.":[92]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2161226201","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":11},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":5}],"updated_date":"2025-03-21T10:57:55.557345","created_date":"2016-06-24"}