{"id":"https://openalex.org/W3093885860","doi":"https://doi.org/10.1109/access.2020.3030685","title":"A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering","display_name":"A Video Steganalytic Approach Against Quantized Transform Coefficient-Based H.264 Steganography by Exploiting In-Loop Deblocking Filtering","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3093885860","doi":"https://doi.org/10.1109/access.2020.3030685","mag":"3093885860"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3030685","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3030685","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09222130.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09222130.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060364014","display_name":"Hong Zhang","orcid":"https://orcid.org/0000-0003-3480-0244"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hong Zhang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-3480-0244","affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003269656","display_name":"Weike You","orcid":"https://orcid.org/0000-0002-2642-6005"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weike You","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-2642-6005","affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100750788","display_name":"Xianfeng Zhao","orcid":"https://orcid.org/0000-0002-5617-8399"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianfeng Zhao","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-5617-8399","affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060364014"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.4904,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.66734011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"186862","last_page":"186878"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deblocking-filter","display_name":"Deblocking filter","score":0.7529536485671997},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6832626461982727},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6673557758331299},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.6375951170921326},{"id":"https://openalex.org/keywords/loop","display_name":"Loop (graph theory)","score":0.47772905230522156},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4531429708003998},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4474036991596222},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4432516098022461},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.41680708527565},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.3646056652069092},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23962655663490295},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2083132266998291}],"concepts":[{"id":"https://openalex.org/C143184774","wikidata":"https://www.wikidata.org/wiki/Q3020846","display_name":"Deblocking filter","level":2,"score":0.7529536485671997},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6832626461982727},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6673557758331299},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.6375951170921326},{"id":"https://openalex.org/C184670325","wikidata":"https://www.wikidata.org/wiki/Q512604","display_name":"Loop (graph theory)","level":2,"score":0.47772905230522156},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4531429708003998},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4474036991596222},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4432516098022461},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41680708527565},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.3646056652069092},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23962655663490295},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2083132266998291},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3030685","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3030685","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09222130.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c2689537c39149cbac062106b69c8f74","is_oa":true,"landing_page_url":"https://doaj.org/article/c2689537c39149cbac062106b69c8f74","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 186862-186878 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3030685","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3030685","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09222130.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G3301313184","display_name":null,"funder_award_id":"2019QY0701","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4223009200","display_name":null,"funder_award_id":"61872356","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4622609102","display_name":null,"funder_award_id":"61972390","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4986664143","display_name":null,"funder_award_id":"61972390","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5792040927","display_name":null,"funder_award_id":"2019QY0701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6263214073","display_name":null,"funder_award_id":"U1736214","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8061328307","display_name":null,"funder_award_id":"61802393","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3093885860.pdf","grobid_xml":"https://content.openalex.org/works/W3093885860.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W24089286","https://openalex.org/W797749866","https://openalex.org/W1957884963","https://openalex.org/W1976260273","https://openalex.org/W2026506932","https://openalex.org/W2035304223","https://openalex.org/W2035385859","https://openalex.org/W2038604799","https://openalex.org/W2044465660","https://openalex.org/W2069994443","https://openalex.org/W2085993320","https://openalex.org/W2096186241","https://openalex.org/W2098629468","https://openalex.org/W2104705565","https://openalex.org/W2115593345","https://openalex.org/W2122086266","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2135495500","https://openalex.org/W2140199336","https://openalex.org/W2146966794","https://openalex.org/W2162974356","https://openalex.org/W2170311913","https://openalex.org/W2228846556","https://openalex.org/W2390908025","https://openalex.org/W2547605526","https://openalex.org/W2554633494","https://openalex.org/W2604555794","https://openalex.org/W2735134276","https://openalex.org/W2809102884","https://openalex.org/W2809353336","https://openalex.org/W2891313575","https://openalex.org/W2982045113","https://openalex.org/W6600983433"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2792878404","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W1716757876"],"abstract_inverted_index":{"This":[0],"article":[1],"presents":[2],"a":[3,115,130],"method":[4,155],"for":[5,17,31,80,121],"detection":[6],"of":[7,64,76,91,104,132,138,159],"H.264":[8,27,168],"steganographic":[9],"algorithms":[10],"that":[11,43],"modulate":[12],"quantized":[13],"transform":[14],"coefficients":[15],"(QTCs)":[16],"data":[18],"hiding.":[19],"The":[20,142],"in-loop":[21],"deblocking":[22,45],"filter":[23],"specified":[24],"in":[25,167],"the":[26,33,44,62,74,88,102,105,136,139,150],"standard":[28],"is":[29,119,156],"used":[30],"attenuating":[32],"discontinuities":[34],"at":[35,171],"coded":[36],"block":[37,78],"boundaries.":[38],"However,":[39],"our":[40,153],"investigation":[41],"indicates":[42],"filtering":[46,68,71,75,98],"process":[47],"would":[48],"probably":[49],"be":[50],"affected":[51],"by":[52,60,97],"QTC":[53,65,165],"modification.":[54],"Therefore,":[55],"we":[56,84],"suggest":[57],"performing":[58],"steganalysis":[59],"considering":[61],"influence":[63],"modification":[66,92,106,166],"on":[67,113,163],"decisions":[69],"and":[70,100,123],"operations.":[72],"In":[73],"luma":[77,82],"edges,":[79],"each":[81],"sample,":[83],"try":[85],"to":[86,94,108,134],"obtain":[87],"cumulative":[89],"amount":[90],"applied":[93],"it":[95],"caused":[96],"operations,":[99],"determine":[101],"frequency":[103],"made":[107],"its":[109],"sample":[110],"value.":[111],"Based":[112],"this,":[114],"768-dimensional":[116],"feature":[117],"set":[118],"designed":[120],"training":[122],"classification.":[124],"Extensive":[125],"experiments":[126],"were":[127],"conducted":[128],"under":[129],"range":[131],"setups":[133],"evaluate":[135],"effectiveness":[137],"proposed":[140,154],"method.":[141],"corresponding":[143],"experimental":[144],"results":[145],"demonstrate":[146],"that,":[147],"compared":[148],"with":[149],"prior":[151],"art,":[152],"generally":[157],"capable":[158],"providing":[160],"superior":[161],"performance":[162],"detecting":[164],"video,":[169],"even":[170],"low":[172],"embedding":[173],"strengths.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-05-18T08:16:58.900851","created_date":"2025-10-10T00:00:00"}
