{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:11:25Z","timestamp":1760346685611,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T00:00:00Z","timestamp":1519344000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772111"],"award-info":[{"award-number":["61772111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Foundation for Innovative Research Groups of the NSFC","award":["71421001"],"award-info":[{"award-number":["71421001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-018-5734-x","type":"journal-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T09:34:10Z","timestamp":1519378450000},"page":"17993-18005","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Double-compressed JPEG images steganalysis with transferring feature"],"prefix":"10.1007","volume":"77","author":[{"given":"Yong","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0851-6752","authenticated-orcid":false,"given":"Xiangwei","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Chaoyu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,23]]},"reference":[{"issue":"454","key":"5734_CR1","first-page":"488","volume":"96","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break our steganographic system: the ins and outs of organizing BOSS. Int Workshop Inf Hiding Springer Berlin Heidelberg 96 (454):488\u2013499","journal-title":"Int Workshop Inf Hiding Springer Berlin Heidelberg"},{"key":"5734_CR2","unstructured":"Bhartiya G, Jalal AS (2016) Forgery detection using feature-clustering in recompressed jpeg images. Multimed Tools Appl, 1\u201316"},{"issue":"14","key":"5734_CR3","doi-asserted-by":"publisher","first-page":"e49","DOI":"10.1093\/bioinformatics\/btl242","volume":"22","author":"KM Borgwardt","year":"2006","unstructured":"Borgwardt KM, Gretton A, Rasch MJ, Kriegel HP, Sch\u00f6lkopf B, Smola AJ (2006) Integrating structured biological data by kernel maximum mean discrepancy. Bioinformatics 22(14):e49\u2013e57","journal-title":"Bioinformatics"},{"key":"5734_CR4","unstructured":"El-Alfy ESM, Qureshi MA (2016) Robust content authentication of gray and color images using lbp-dct markov-based features. Multimed Tools Appl, 1\u201322"},{"issue":"2","key":"5734_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forens Secur 10(2):219\u2013228","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5734_CR6","first-page":"1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 1:1","journal-title":"Eurasip J Inf Secur"},{"key":"5734_CR7","first-page":"79","volume":"9028","author":"AD Ker","year":"2014","unstructured":"Ker AD, Pevn\u00fd T (2014) A mishmash of methods for mitigating the model mismatch mess, IS&T\/SPIE electronic imaging. Int Soc Opt Photon 9028:79\u201385","journal-title":"Int Soc Opt Photon"},{"key":"5734_CR8","doi-asserted-by":"crossref","unstructured":"Ker AD, Bas P, B\u00f6hme R, Coqranne R, Craver S, Filler T, Fridrich J, Pevn\u00fd T (2013) Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp 45\u201358","DOI":"10.1145\/2482513.2482965"},{"key":"5734_CR9","doi-asserted-by":"crossref","unstructured":"Kodovsky J, Fridrich J (2012) Steganalysis of JPEG images using rich models. IS&T\/SPIE electronic imaging. International Society for Optics and Photonics, 83030A-83030A-13","DOI":"10.1117\/12.907495"},{"issue":"2","key":"5734_CR10","first-page":"96","volume":"9028","author":"J Kodovsky","year":"2014","unstructured":"Kodovsky J, Sedighi V, Fridrich J (2014) Study of cover source mismatch in steganalysis and ways to mitigate its impact, IS&T\/SPIE electronic imaging. Int Soc Opt Photon 9028(2):96\u2013101","journal-title":"Int Soc Opt Photon"},{"key":"5734_CR11","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.neucom.2016.06.037","volume":"214","author":"X Kong","year":"2016","unstructured":"Kong X, Feng C, Li M, Guo Y (2016) Iterative multi-order feature alignment for JPEG mismatched steganalysis. Neurocomputing 214:458\u2013470","journal-title":"Neurocomputing"},{"key":"5734_CR12","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Proc. NIPS, pp 1097\u20131105"},{"key":"5734_CR13","unstructured":"Li B, Shi Y Q, Huang J (2008) Detecting doubly compressed JPEG images by using mode based first digit features. In: Processing IEEE 10th workshop on multimedia signal. IEEE, pp 730\u2013735"},{"key":"5734_CR14","doi-asserted-by":"crossref","unstructured":"Li X, Kong X, Wang B, Guo Y, You X (2013) Generalized transfer component analysis for mismatched JPEG steganalysis. In: 20th IEEE International conference on image processing (ICIP). IEEE, pp 4432\u20134436","DOI":"10.1109\/ICIP.2013.6738913"},{"issue":"17","key":"5734_CR15","first-page":"1","volume":"74","author":"H Li","year":"2014","unstructured":"Li H, Luo W, Huang J (2014) Anti-forensics of double jpeg compression with the same quantization matrix. Multimed Tools Appl 74(17):1\u201316","journal-title":"Multimed Tools Appl"},{"key":"5734_CR16","doi-asserted-by":"crossref","unstructured":"Long M, Wang J, Ding G, Sun J, Yu PS (2013) Transfer feature learning with joint distribution adaptation. In: IEEE International conference on computer vision. IEEE, pp 2200\u20132207","DOI":"10.1109\/ICCV.2013.274"},{"key":"5734_CR17","doi-asserted-by":"crossref","unstructured":"Lubenko I, Ker AD (2012) Steganalysis with mismatched covers: do simple classifiers help? In: Proceedings of the on multimedia and security. ACM, pp 11\u201318","DOI":"10.1145\/2361407.2361410"},{"key":"5734_CR18","unstructured":"Luk\u00e1\u0161 J, Fridrich J (2003) Estimation of primary quantization matrix in double compressed JPEG images. In: Proc. Digital forensic research workshop, pp 5\u20138"},{"issue":"2","key":"5734_CR19","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan SJ, Tsang IW, Kwok JT, Yang Q (2011) Domain adaptation via transfer component analysis. IEEE Trans Neural Netw 22(2):199\u2013210","journal-title":"IEEE Trans Neural Netw"},{"key":"5734_CR20","doi-asserted-by":"crossref","unstructured":"Pennebaker WB, Mitchell JL (1992) JPEG: still image data compression standard. Springer Science & Business Media","DOI":"10.1117\/12.48892"},{"key":"5734_CR21","unstructured":"Pevn\u00fd T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG steganalysis. In: Proc. of SPIE security steganography and watermarking of multimedia contents, vol 6505. San Jose, pp 1\u201313"},{"issue":"2","key":"5734_CR22","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TIFS.2008.922456","volume":"3","author":"T Pevn\u00fd","year":"2008","unstructured":"Pevn\u00fd T, Fridrich J (2008) Detection of double-compression in JPEG images for applications in steganography. IEEE Trans Inf Forens Secur 3(2):247\u2013258","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5734_CR23","first-page":"323","volume":"10","author":"N Provos","year":"2001","unstructured":"Provos N (2001) Defending against statistical steganalysis. Usenix Secur Sympos 10:323\u2013336","journal-title":"Usenix Secur Sympos"},{"key":"5734_CR24","doi-asserted-by":"crossref","unstructured":"Sallee P (2003) Model-based steganography. In: International workshop on digital watermarking, vol 2939. Springer, Berlin, pp 154\u2013167","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"5734_CR25","first-page":"1","volume":"2","author":"H Sajedi","year":"2017","unstructured":"Sajedi H (2017) Adaptive image steganalysis. Multimed Tools Appl 2:1\u201316","journal-title":"Multimed Tools Appl"},{"key":"5734_CR26","unstructured":"Song X, Liu F, Zhang Z, Yang C, Luo X, Chen L (2016) 2d gabor filters-based steganalysis of content-adaptive jpeg steganography. Multimed Tools Appl, 1\u201329"},{"issue":"6","key":"5734_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-3409-z","volume":"76","author":"A Taimori","year":"2017","unstructured":"Taimori A, Razzazi F, Behrad A, Ahmadi A, Babaie-Zadeh M (2017) A novel forensic image analysis tool for discovering double jpeg compression clues. Multimed Tools Appl 76(6):1\u201335","journal-title":"Multimed Tools Appl"},{"key":"5734_CR28","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5-A Steganographic algorithm. Information hiding, international workshop, Ihw. Pittsburgh, Proceedings, vol 2137, pp 289\u2013302. DBLP","DOI":"10.1007\/3-540-45496-9_21"},{"key":"5734_CR29","doi-asserted-by":"crossref","unstructured":"Zeng L, Kong X, Li M, Guo Y (2015) JPEG quantization table mismatched steganalysis via robust discriminative feature transformation, SPIE\/IS & T Electronic Imaging. International Society for Optics and Photonics, 94090U-94090U-9","DOI":"10.1117\/12.2078188"},{"issue":"3","key":"5734_CR30","first-page":"1","volume":"76","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Luo X, Yang C, Liu F (2017) Joint jpeg compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multimed Tools Appl 76(3):1\u201320","journal-title":"Multimed Tools Appl"},{"key":"5734_CR31","doi-asserted-by":"crossref","unstructured":"Zheng L, Wang S, Liu Z, Tian Q (2014) Packing and padding: coupled multiindex for accurate image retrieval. In: Proc. CVPR, pp 1939\u20131946","DOI":"10.1109\/CVPR.2014.250"},{"issue":"1","key":"5734_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11263-016-0889-2","volume":"120","author":"L Zheng","year":"2016","unstructured":"Zheng L, Wang S, Wang J, Tian Q (2016) Accurate image search with multi-scale contextual evidences. Int J Comput Vis 120(1):1\u201313","journal-title":"Int J Comput Vis"},{"key":"5734_CR33","doi-asserted-by":"publisher","unstructured":"Zheng L, Yang Y, Tian Q (2017) Sift meets cnn: a decade survey of instance retrieval. In: IEEE Transactions on pattern analysis and machine intelligence. https:\/\/doi.org\/10.1109\/TPAMI.2017.2709749","DOI":"10.1109\/TPAMI.2017.2709749"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5734-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5734-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5734-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T14:06:30Z","timestamp":1570802790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5734-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,23]]},"references-count":33,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5734"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5734-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,2,23]]},"assertion":[{"value":"14 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}