{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:38:39Z","timestamp":1775853519041,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Technology R&D Program","award":["2016QY15Z2500"],"award-info":[{"award-number":["2016QY15Z2500"]}]},{"name":"National Key Technology R&D Program","award":["2016YFB0801003"],"award-info":[{"award-number":["2016YFB0801003"]}]},{"name":"NSFC","award":["U1536105"],"award-info":[{"award-number":["U1536105"]}]},{"name":"NSFC","award":["U1636102"],"award-info":[{"award-number":["U1636102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,14]]},"DOI":"10.1145\/3206004.3206011","type":"proceedings-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T12:12:39Z","timestamp":1529496759000},"page":"55-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain"],"prefix":"10.1145","author":[{"given":"Yuntao","family":"Wang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Kun","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaowei","family":"Yi","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xianfeng","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhoujun","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Information Technology Institute, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083234"},{"key":"e_1_3_2_1_2_1","volume-title":"Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium","author":"Judas Jan","year":"2010","unstructured":"Tom\u00e1? Filler, Jan Judas , and Jessica J Fridrich . 2010. Minimizing embedding impact in steganography using trellis-coded quantization . In Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium , San Jose, CA, USA , January 18--20, 2010 , Proceedings . 754105. Tom\u00e1? Filler, Jan Judas, and Jessica J Fridrich. 2010. Minimizing embedding impact in steganography using trellis-coded quantization. In Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18--20, 2010, Proceedings. 754105."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_4_1","first-page":"009","article-title":"The MP3 steganography algorithm based on Huffman coding","volume":"4","author":"Gao Haiying","year":"2007","unstructured":"Haiying Gao . 2007 . The MP3 steganography algorithm based on Huffman coding . Acta Scientiarum Naturalium Universitatis Sunyatseni 4 (2007), 009 . Haiying Gao. 2007. The MP3 steganography algorithm based on Huffman coding. Acta Scientiarum Naturalium Universitatis Sunyatseni 4 (2007), 009.","journal-title":"Acta Scientiarum Naturalium Universitatis Sunyatseni"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2015.12.015"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010","author":"Glorot Xavier","year":"2010","unstructured":"Xavier Glorot and Yoshua Bengio . 2010 . Understanding the difficulty of training deep feedforward neural networks . In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010 , Chia Laguna Resort, Sardinia, Italy, May 13--15 , 2010. 249--256. Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, May 13--15, 2010. 249--256."},{"key":"e_1_3_2_1_7_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016 , Las Vegas, NV, USA, June 27--30 , 2016. 770--778. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27--30, 2016. 770--778."},{"key":"e_1_3_2_1_8_1","unstructured":"Robert Hegemann Alexander Leidinger and Rog\u00c3?rio Brito. 1998. LAME. https: \/\/sourceforge.net\/projects\/lame\/files\/lame\/.  Robert Hegemann Alexander Leidinger and Rog\u00c3?rio Brito. 1998. LAME. https: \/\/sourceforge.net\/projects\/lame\/files\/lame\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning, ICML 2015","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch normalization: Accelerating deep network training by reducing internal covariate shift . In Proceedings of the 32nd International Conference on Machine Learning, ICML 2015 , Lille, France, 6- -11 July 2015. 448--456. Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Lille, France, 6--11 July 2015. 448--456."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3264-y"},{"key":"e_1_3_2_1_11_1","volume-title":"Adam: A method for stochastic optimization. CoRR abs\/1412.6980","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. CoRR abs\/1412.6980 (2014). Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. CoRR abs\/1412.6980 (2014)."},{"key":"e_1_3_2_1_12_1","volume-title":"Network in network. CoRR abs\/1312.4400","author":"Lin Min","year":"2013","unstructured":"Min Lin , Qiang Chen , and Shuicheng Yan . 2013. Network in network. CoRR abs\/1312.4400 ( 2013 ). Min Lin, Qiang Chen, and Shuicheng Yan. 2013. Network in network. CoRR abs\/1312.4400 (2013)."},{"key":"e_1_3_2_1_13_1","first-page":"26","article-title":"Audio watermarking based on partial mp3 encoding","volume":"43","author":"Liu Wei","year":"2004","unstructured":"Wei Liu , Shuo-zhong Wang, and Xin-peng Zhang. 2004 . Audio watermarking based on partial mp3 encoding . Acta Scientiarum Naturalium Univ. Sunyatseni 43 , S2 (2004), 26 -- 33 . Wei Liu, Shuo-zhong Wang, and Xin-peng Zhang. 2004. Audio watermarking based on partial mp3 encoding. Acta Scientiarum Naturalium Univ. Sunyatseni 43, S2 (2004), 26--33.","journal-title":"Acta Scientiarum Naturalium Univ. Sunyatseni"},{"key":"e_1_3_2_1_14_1","unstructured":"Fabien Petitcolas. 2002. MP3Stego. http:\/\/www.petitcolas.net\/steganography\/ mp3stego\/.  Fabien Petitcolas. 2002. MP3Stego. http:\/\/www.petitcolas.net\/steganography\/ mp3stego\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.10.013"},{"key":"e_1_3_2_1_16_1","volume-title":"IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 217--231","author":"Ren Yanzhen","year":"2017","unstructured":"Yanzhen Ren , Qiaochu Xiong , and Lina Wang . 2017 . A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. In Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 217--231 . Yanzhen Ren, Qiaochu Xiong, and Lina Wang. 2017. A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. In Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 217--231."},{"key":"e_1_3_2_1_17_1","volume-title":"Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 (2014)."},{"key":"e_1_3_2_1_18_1","first-page":"118","article-title":"Steganalysis of MP3Stego based on Huffman table distribution and recording","volume":"29","author":"Wan Wei","year":"2012","unstructured":"Wei Wan , Xianfeng Zhao , Wei Huang , and Rennong Sheng . 2012 . Steganalysis of MP3Stego based on Huffman table distribution and recording . Journal of Graduate University of Chinese Academy of Science 29 , 1 (2012), 118 -- 124 . Wei Wan, Xianfeng Zhao, Wei Huang, and Rennong Sheng. 2012. Steganalysis of MP3Stego based on Huffman table distribution and recording. Journal of Graduate University of Chinese Academy of Science 29, 1 (2012), 118--124.","journal-title":"Journal of Graduate University of Chinese Academy of Science"},{"key":"e_1_3_2_1_19_1","volume-title":"Third International Workshop, IH'99","author":"Westfeld Andreas","year":"1999","unstructured":"Andreas Westfeld and Andreas Pfitzmann . 1999 . Attacks on steganographic systems. In Information Hiding , Third International Workshop, IH'99 , Dresden, Germany, September 29 - October 1, 1999, Proceedings. 61--76. Andreas Westfeld and Andreas Pfitzmann. 1999. Attacks on steganographic systems. In Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings. 61--76."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1406-z"},{"key":"e_1_3_2_1_21_1","first-page":"013","article-title":"A high capacity MP3 steganography based on Huffman coding","volume":"6","author":"Yan Diqun","year":"2011","unstructured":"Diqun Yan , Rangding Wang , and Li-Guang ZHANG. 2011 . A high capacity MP3 steganography based on Huffman coding . Journal of Sichuan University (Natural Science Edition) 6 (2011), 013 . Diqun Yan, Rangding Wang, and Li-Guang ZHANG. 2011. A high capacity MP3 steganography based on Huffman coding. Journal of Sichuan University (Natural Science Edition) 6 (2011), 013.","journal-title":"Journal of Sichuan University (Natural Science Edition)"},{"key":"e_1_3_2_1_22_1","volume-title":"IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 202--216","author":"Yang Kun","year":"2017","unstructured":"Kun Yang , Xiaowei Yi , Xianfeng Zhao , and Linna Zhou . 2017 . Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. In Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 202--216 . Kun Yang, Xiaowei Yi, Xianfeng Zhao, and Linna Zhou. 2017. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. In Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23--25, 2017, Proceedings. 202--216."}],"event":{"name":"IH&MMSec '18: 6th ACM Workshop on Information Hiding and Multimedia Security","location":"Innsbruck Austria","acronym":"IH&MMSec '18","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3206004.3206011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:15Z","timestamp":1750208895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3206004.3206011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":22,"alternative-id":["10.1145\/3206004.3206011","10.1145\/3206004"],"URL":"https:\/\/doi.org\/10.1145\/3206004.3206011","relation":{},"subject":[],"published":{"date-parts":[[2018,6,14]]},"assertion":[{"value":"2018-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}