{"id":"https://openalex.org/W2752116773","doi":"https://doi.org/10.1109/icme.2017.8019320","title":"Steganographer detection via deep residual network","display_name":"Steganographer detection via deep residual network","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2752116773","doi":"https://doi.org/10.1109/icme.2017.8019320","mag":"2752116773"},"language":"en","primary_location":{"id":"doi:10.1109/icme.2017.8019320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2017.8019320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005203552","display_name":"Mingjie Zheng","orcid":"https://orcid.org/0000-0001-5472-7035"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingjie Zheng","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086801574","display_name":"Sheng-hua Zhong","orcid":"https://orcid.org/0000-0002-7524-5999"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng-hua Zhong","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101680487","display_name":"Songtao Wu","orcid":"https://orcid.org/0000-0003-1578-8980"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Songtao Wu","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University","Department of Computing, The Hong Kong Polytechnic University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005727907","display_name":"Jianmin Jiang","orcid":"https://orcid.org/0000-0002-7576-3999"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianmin Jiang","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005203552"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.8324,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.82666667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"235","last_page":"240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.882129967212677},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8721507787704468},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8048309683799744},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7786161303520203},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.7764026522636414},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5949985384941101},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5896750688552856},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5640689134597778},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4743691384792328},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4089663028717041},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4062172770500183},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3896792232990265},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32770487666130066},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28278690576553345},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08091703057289124}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.882129967212677},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8721507787704468},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8048309683799744},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7786161303520203},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.7764026522636414},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5949985384941101},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5896750688552856},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5640689134597778},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4743691384792328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4089663028717041},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4062172770500183},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3896792232990265},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32770487666130066},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28278690576553345},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08091703057289124},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icme.2017.8019320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme.2017.8019320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/74196","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/74196","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1673310716","https://openalex.org/W1963536592","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2013626675","https://openalex.org/W2015802699","https://openalex.org/W2031466562","https://openalex.org/W2046180645","https://openalex.org/W2049562124","https://openalex.org/W2081564928","https://openalex.org/W2096050104","https://openalex.org/W2106663508","https://openalex.org/W2125865219","https://openalex.org/W2144182447","https://openalex.org/W2154026545","https://openalex.org/W2163605009","https://openalex.org/W2165835468","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2193183414","https://openalex.org/W2202532860","https://openalex.org/W2322622188","https://openalex.org/W2516800609","https://openalex.org/W2517808396","https://openalex.org/W2542290803","https://openalex.org/W2587310998","https://openalex.org/W2588463901","https://openalex.org/W4254182148","https://openalex.org/W6637131181","https://openalex.org/W6654313321","https://openalex.org/W6662048488","https://openalex.org/W6678814708","https://openalex.org/W6684191040","https://openalex.org/W6687558989","https://openalex.org/W6688045085"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2930153478","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W3154843532","https://openalex.org/W2068740952","https://openalex.org/W2182496537","https://openalex.org/W2792878404"],"abstract_inverted_index":{"Steganographer":[0],"detection":[1,49,88,93],"problem":[2],"is":[3,67],"to":[4,10],"identify":[5],"culprit":[6],"actors,":[7],"who":[8],"try":[9],"hide":[11],"confidential":[12],"information":[13],"with":[14],"steganography,":[15],"among":[16],"many":[17],"innocent":[18,76],"actors.":[19,77],"This":[20],"task":[21],"has":[22],"significant":[23],"challenges,":[24],"including":[25],"various":[26],"embedding":[27],"steganographic":[28],"algorithms":[29,116],"and":[30,75,103,117],"payloads,":[31],"which":[32,66],"are":[33],"usually":[34],"avoided":[35],"in":[36,91],"steganalysis":[37],"under":[38],"laboratory":[39],"conditions.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44],"propose":[45],"a":[46],"novel":[47],"steganographer":[48,92],"model":[50,84,101,110],"based":[51,106],"on":[52],"deep":[53],"residual":[54],"network.":[55],"The":[56],"proposed":[57,83],"method":[58,102],"strengthens":[59],"the":[60,70,82,98,109,112],"signal":[61],"coming":[62],"from":[63],"secret":[64],"messages,":[65],"beneficial":[68],"for":[69],"discrimination":[71],"between":[72],"guilty":[73],"actors":[74],"Comprehensive":[78],"experiments":[79],"demonstrate":[80],"that":[81],"achieves":[85],"very":[86],"low":[87],"error":[89],"rates":[90],"task.":[94],"It":[95],"also":[96],"outperforms":[97],"classical":[99],"rich":[100],"other":[104],"CNN":[105],"method.":[107],"Moreover,":[108],"shows":[111],"robustness":[113],"of":[114],"inter-steganographic":[115],"inter-payloads.":[118]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
