{"id":"https://openalex.org/W3015449005","doi":"https://doi.org/10.1109/icassp40776.2020.9053696","title":"Steganography and its Detection in JPEG Images Obtained with the \"TRUNC\" Quantizer","display_name":"Steganography and its Detection in JPEG Images Obtained with the \"TRUNC\" Quantizer","publication_year":2020,"publication_date":"2020-04-09","ids":{"openalex":"https://openalex.org/W3015449005","doi":"https://doi.org/10.1109/icassp40776.2020.9053696","mag":"3015449005"},"language":"en","primary_location":{"id":"doi:10.1109/icassp40776.2020.9053696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020770256","display_name":"Jan Butora","orcid":"https://orcid.org/0000-0002-2540-1420"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jan Butora","raw_affiliation_strings":["Department of ECE, Binghamton University, Binghamton, NY"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Binghamton University, Binghamton, NY","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081020569","display_name":"Jessica Fridrich","orcid":"https://orcid.org/0009-0003-6516-628X"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jessica Fridrich","raw_affiliation_strings":["Department of ECE, Binghamton University, Binghamton, NY"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Binghamton University, Binghamton, NY","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020770256"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":0.6839,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.70998857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2762","last_page":"2766"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9191263914108276},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.8383288979530334},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8329473733901978},{"id":"https://openalex.org/keywords/rounding","display_name":"Rounding","score":0.815700352191925},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7030367851257324},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5727733969688416},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.5726070404052734},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.5117923617362976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4877851605415344},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.47315821051597595},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.42746463418006897},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36599093675613403},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35053688287734985},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3352018892765045},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.33277949690818787},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.22547286748886108},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.2233244776725769},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.15467002987861633}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9191263914108276},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.8383288979530334},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8329473733901978},{"id":"https://openalex.org/C136625980","wikidata":"https://www.wikidata.org/wiki/Q663208","display_name":"Rounding","level":2,"score":0.815700352191925},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7030367851257324},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5727733969688416},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.5726070404052734},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.5117923617362976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4877851605415344},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.47315821051597595},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.42746463418006897},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36599093675613403},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35053688287734985},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3352018892765045},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33277949690818787},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.22547286748886108},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.2233244776725769},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.15467002987861633},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp40776.2020.9053696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9053696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1492380776","https://openalex.org/W1973466159","https://openalex.org/W2039836978","https://openalex.org/W2041845394","https://openalex.org/W2055625960","https://openalex.org/W2071451750","https://openalex.org/W2124664712","https://openalex.org/W2167999072","https://openalex.org/W2543123829","https://openalex.org/W2545241995","https://openalex.org/W2545848843","https://openalex.org/W2621048556","https://openalex.org/W2735512415","https://openalex.org/W2809171644","https://openalex.org/W2892948265","https://openalex.org/W2917583897","https://openalex.org/W2956737068","https://openalex.org/W2963957509","https://openalex.org/W3037049838","https://openalex.org/W6661069513","https://openalex.org/W6729216077","https://openalex.org/W6752613460","https://openalex.org/W6780372987"],"related_works":["https://openalex.org/W3190486427","https://openalex.org/W4243959093","https://openalex.org/W1998280942","https://openalex.org/W1992410481","https://openalex.org/W1980149576","https://openalex.org/W2441603424","https://openalex.org/W2145138541","https://openalex.org/W2026465795","https://openalex.org/W3137515556","https://openalex.org/W4385625475"],"abstract_inverted_index":{"Many":[0],"portable":[1],"imaging":[2],"devices":[3],"use":[4],"the":[5,16,49,53,65,88,91],"operation":[6],"of":[7,13,52,87,90],"\"trunc\"":[8],"(rounding":[9],"towards":[10],"zero)":[11],"instead":[12],"rounding":[14,54],"as":[15],"final":[17],"quantizer":[18,93],"for":[19,34,74],"computing":[20],"DCT":[21],"coefficients":[22],"during":[23],"JPEG":[24,66],"compression.":[25],"We":[26],"show":[27],"that":[28],"this":[29,75],"has":[30],"rather":[31],"profound":[32],"consequences":[33],"steganography":[35,42],"and":[36,69],"its":[37],"detection.":[38],"In":[39],"particular,":[40],"side-informed":[41],"needs":[43,70],"to":[44,48,62,71,80],"be":[45,72,81],"redesigned":[46],"due":[47],"different":[50],"nature":[51],"error.":[55],"The":[56],"steganographic":[57],"algorithm":[58],"J-UNIWARD":[59],"becomes":[60],"vulnerable":[61],"steganalysis":[63],"with":[64],"rich":[67],"model":[68],"adjusted":[73],"source.":[76],"Steganalysis":[77],"detectors":[78],"need":[79],"retrained":[82],"since":[83],"a":[84],"steganalyst":[85],"unaware":[86],"existence":[89],"trunc":[92],"will":[94],"experience":[95],"100%":[96],"false":[97],"alarm.":[98]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
