{"id":"https://openalex.org/W2515202624","doi":"https://doi.org/10.1109/icip.2016.7532857","title":"Local ternary pattern based on path integral for steganalysis","display_name":"Local ternary pattern based on path integral for steganalysis","publication_year":2016,"publication_date":"2016-08-17","ids":{"openalex":"https://openalex.org/W2515202624","doi":"https://doi.org/10.1109/icip.2016.7532857","mag":"2515202624"},"language":"en","primary_location":{"id":"doi:10.1109/icip.2016.7532857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip.2016.7532857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qiuyan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiuyan Lin","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100761525","display_name":"Jiaying Liu","orcid":"https://orcid.org/0000-0002-0468-9576"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaying Liu","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001396675","display_name":"Zongming Guo","orcid":"https://orcid.org/0000-0002-4944-9621"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongming Guo","raw_affiliation_strings":["Institute of Computer Science and Technology, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science and Technology, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.6759,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77500371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"19","issue":null,"first_page":"2737","last_page":"2741"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9365760684013367},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.7219946384429932},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6923105120658875},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6656977534294128},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6306575536727905},{"id":"https://openalex.org/keywords/local-binary-patterns","display_name":"Local binary patterns","score":0.5270923376083374},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5053939819335938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47487708926200867},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.46147868037223816},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.41818729043006897},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.37354838848114014},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3314863443374634},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.17114287614822388}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9365760684013367},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.7219946384429932},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6923105120658875},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6656977534294128},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6306575536727905},{"id":"https://openalex.org/C87335442","wikidata":"https://www.wikidata.org/wiki/Q2494345","display_name":"Local binary patterns","level":4,"score":0.5270923376083374},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5053939819335938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47487708926200867},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.46147868037223816},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.41818729043006897},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.37354838848114014},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3314863443374634},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.17114287614822388}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icip.2016.7532857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icip.2016.7532857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Image Processing (ICIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1545641654","https://openalex.org/W1825459403","https://openalex.org/W2000251700","https://openalex.org/W2009130368","https://openalex.org/W2022649217","https://openalex.org/W2027272619","https://openalex.org/W2031466562","https://openalex.org/W2039051707","https://openalex.org/W2055741016","https://openalex.org/W2071684956","https://openalex.org/W2076312302","https://openalex.org/W2076342172","https://openalex.org/W2095037765","https://openalex.org/W2098063201","https://openalex.org/W2098305432","https://openalex.org/W2106663508","https://openalex.org/W2124664712","https://openalex.org/W2131081720","https://openalex.org/W2139916508","https://openalex.org/W2145310492","https://openalex.org/W2153615901","https://openalex.org/W2163352848","https://openalex.org/W2164027883","https://openalex.org/W2293488289","https://openalex.org/W6632636493","https://openalex.org/W6638644366","https://openalex.org/W6650560427"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W2792878404","https://openalex.org/W3154843532"],"abstract_inverted_index":{"The":[0],"least":[1],"significant":[2],"bit":[3],"(LSB)":[4],"matching":[5],"is":[6,46,67,107],"a":[7,64,103,126],"steganographic":[8],"method":[9,111,124],"which":[10],"embeds":[11],"the":[12,19,23,27,56,71,74,78,85,96,114,130],"stego":[13,24,79],"signal":[14,25],"into":[15],"cover":[16,33],"images":[17],"in":[18,32,99,109],"spatial":[20],"domain.":[21],"However,":[22],"disturbs":[26],"correlation":[28,57,75],"of":[29,58,73,117],"neighboring":[30,59],"pixels":[31],"image":[34,49],"and":[35,52],"this":[36,62],"can":[37,54],"be":[38],"utilized":[39,108],"for":[40],"steganalysis.":[41],"Local":[42],"binary":[43],"pattern":[44,88],"(LBP)":[45],"an":[47],"effective":[48],"texture":[50],"descriptor,":[51],"it":[53],"summarize":[55],"pixels.":[60,101],"In":[61],"paper,":[63],"LBP-based":[65],"steganalyzer":[66],"proposed":[68],"to":[69,94,112],"identify":[70],"deviations":[72],"violated":[76],"by":[77],"noise.":[80],"Specifically,":[81],"our":[82,110,123],"paper":[83],"proposes":[84],"local":[86],"ternary":[87],"based":[89],"on":[90],"path":[91],"integral":[92],"(pi-LTP)":[93],"enhance":[95],"feature":[97],"discrimination":[98],"large-scale":[100],"Moreover,":[102],"greedy":[104],"incremental":[105],"algorithm":[106],"select":[113],"optimal":[115],"subspace":[116],"pi-LTP":[118],"features.":[119],"Experimental":[120],"results":[121],"show":[122],"has":[125],"better":[127],"performance":[128],"than":[129],"state-of-the-art":[131],"steganalysis":[132],"methods.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
