{"id":"https://openalex.org/W4400489901","doi":"https://doi.org/10.1109/cscwd61410.2024.10580683","title":"A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis","display_name":"A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4400489901","doi":"https://doi.org/10.1109/cscwd61410.2024.10580683"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd61410.2024.10580683","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd61410.2024.10580683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101918338","display_name":"Ming Jiang","orcid":"https://orcid.org/0000-0001-9264-1363"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Jiang","raw_affiliation_strings":["Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100450362","display_name":"Shuo Zhang","orcid":"https://orcid.org/0000-0002-2170-4299"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Zhang","raw_affiliation_strings":["Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736536","display_name":"Feng Zhang","orcid":"https://orcid.org/0000-0003-1719-9645"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Zhang","raw_affiliation_strings":["Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088289655","display_name":"Biao Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Guo","raw_affiliation_strings":["Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100579037","display_name":"Yun Li","orcid":"https://orcid.org/0009-0000-5138-1374"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Li","raw_affiliation_strings":["Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University Of Electronic Technology,School of Computer Science and Information Security,Guilin,China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101918338"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09694577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"2662","last_page":"2667"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9385526180267334},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.718555212020874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6567627191543579},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6115858554840088},{"id":"https://openalex.org/keywords/image-fusion","display_name":"Image fusion","score":0.5774567127227783},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.571672260761261},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5668783187866211},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5269725322723389},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5182902216911316},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.45907163619995117},{"id":"https://openalex.org/keywords/fusion","display_name":"Fusion","score":0.4440891444683075},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3725399971008301}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9385526180267334},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.718555212020874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6567627191543579},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6115858554840088},{"id":"https://openalex.org/C69744172","wikidata":"https://www.wikidata.org/wiki/Q860822","display_name":"Image fusion","level":3,"score":0.5774567127227783},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.571672260761261},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5668783187866211},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5269725322723389},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5182902216911316},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.45907163619995117},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.4440891444683075},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3725399971008301},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd61410.2024.10580683","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cscwd61410.2024.10580683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1589812914","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2040299224","https://openalex.org/W2081564928","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2322622188","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2621048556","https://openalex.org/W2791370475","https://openalex.org/W2883780447","https://openalex.org/W2892948265","https://openalex.org/W2946033444","https://openalex.org/W2963957509","https://openalex.org/W2969585684","https://openalex.org/W2971028215","https://openalex.org/W3035414587","https://openalex.org/W3046549894","https://openalex.org/W3094502228","https://openalex.org/W3160694286","https://openalex.org/W4239092273","https://openalex.org/W4293057081","https://openalex.org/W4295073605","https://openalex.org/W4309955902","https://openalex.org/W4312960790","https://openalex.org/W6696876242","https://openalex.org/W6763810570","https://openalex.org/W6846863797"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W2792878404","https://openalex.org/W3154843532"],"abstract_inverted_index":{"Image":[0],"steganography":[1,20],"and":[2,72,113,202],"image":[3,30,36,61,98,218],"steganalysis":[4,37,82,219],"is":[5,38,43,165,196],"one":[6],"of":[7,14,19,29,35,55,60,68,74,91,115,118,150,175,206],"the":[8,12,17,32,47,53,58,66,75,88,141,146,155,179,192,204,212],"research":[9],"hotspots":[10],"in":[11,46,57,140,154],"field":[13],"information":[15,45],"security,":[16],"abuse":[18],"causes":[21],"many":[22],"security":[23],"risks.":[24],"As":[25],"an":[26],"attack":[27],"method":[28],"steganography,":[31],"main":[33],"purpose":[34],"to":[39,65,77,121,144,167,171,198],"detect":[40],"whether":[41],"there":[42],"secret":[44],"image.":[48],"Recent":[49],"works":[50],"have":[51],"demonstrated":[52],"efficacy":[54],"CNN":[56],"realm":[59],"steganalysis.":[62,99],"However,":[63],"due":[64],"limitation":[67],"convolution":[69],"kernel":[70],"size":[71],"lack":[73],"ability":[76],"model":[78,137],"long-range":[79],"dependencies,":[80],"CNN-based":[81],"methods":[83],"face":[84],"challenges":[85],"with":[86,134],"capturing":[87],"global":[89,180,183],"features":[90,117,184],"steganographic":[92,119,151,176],"images":[93,120],"which":[94,110],"are":[95,132],"beneficial":[96],"for":[97],"This":[100],"paper":[101],"proposes":[102],"a":[103,159,186],"multi-branch":[104],"feature":[105,156,173,200],"fusion":[106,114,162],"network,":[107],"called":[108],"MFFNet,":[109],"effective":[111],"extraction":[112,157],"different":[116,169],"achieve":[122],"better":[123],"detection":[124],"performance.":[125],"Firstly,":[126],"several":[127,216],"residual":[128],"attention":[129,189],"blocks":[130],"(RAB)":[131],"incorporated":[133],"spatial":[135],"rich":[136,172],"filters":[138],"(SRM)":[139],"preprocessing":[142],"phase":[143],"enhance":[145],"signal-to-noise":[147],"ratio":[148],"(SNR)":[149],"signals.":[152],"Secondly,":[153],"phase,":[158],"three-branch":[160],"parallel":[161],"module":[163],"(TFM)":[164],"designed":[166],"fuse":[168],"branches":[170],"representations":[174],"images,":[177],"where":[178],"branch":[181],"captures":[182],"by":[185],"hardware-friendly":[187],"(DFC)":[188],"mechanism.":[190],"Finally,":[191],"channel":[193],"split":[194],"mechanism":[195],"exploited":[197],"prevent":[199],"redundancies":[201],"decrease":[203],"number":[205],"parameters.":[207],"The":[208],"experiments":[209],"reflect":[210],"that":[211],"proposed":[213],"network":[214],"outperforms":[215],"state-of-the-art":[217],"methods.":[220]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
