{"id":"https://openalex.org/W2170226877","doi":"https://doi.org/10.1109/ijcnn.2008.4634004","title":"Building resilient classifiers for LSB matching steganography","display_name":"Building resilient classifiers for LSB matching steganography","publication_year":2008,"publication_date":"2008-06-01","ids":{"openalex":"https://openalex.org/W2170226877","doi":"https://doi.org/10.1109/ijcnn.2008.4634004","mag":"2170226877"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2008.4634004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2008.4634004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011091110","display_name":"Rita Ferreira","orcid":"https://orcid.org/0000-0002-5573-885X"},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]}],"countries":["PT"],"is_corresponding":true,"raw_author_name":"Rita Ferreira","raw_affiliation_strings":["Department of Informatics Engineering,CISUC, University of Coimbra, Portugal"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Engineering,CISUC, University of Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046882659","display_name":"Bernardete Ribeiro","orcid":"https://orcid.org/0000-0002-9770-7672"},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Bernardete Ribeiro","raw_affiliation_strings":["Department of Informatics Engineering,CISUC, University of Coimbra, Portugal"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Engineering,CISUC, University of Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100371897","display_name":"Catarina Silva","orcid":"https://orcid.org/0000-0002-5656-0061"},"institutions":[{"id":"https://openalex.org/I169427155","display_name":"Instituto Polit\u00e9cnico de Leiria","ror":"https://ror.org/010dvvh94","country_code":"PT","type":"education","lineage":["https://openalex.org/I169427155"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Catarina Silva","raw_affiliation_strings":["School of Technology and Management, Polytechnic Institute of Leiria, Portugal"],"affiliations":[{"raw_affiliation_string":"School of Technology and Management, Polytechnic Institute of Leiria, Portugal","institution_ids":["https://openalex.org/I169427155"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100746642","display_name":"Qingzhong Liu","orcid":"https://orcid.org/0000-0002-2006-5413"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qingzhong Liu","raw_affiliation_strings":["Department of Computer Science, New Mexico Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Mexico Technology, USA","institution_ids":["https://openalex.org/I207123951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027821975","display_name":"Andrew H. Sung","orcid":"https://orcid.org/0009-0005-0815-3102"},"institutions":[{"id":"https://openalex.org/I207123951","display_name":"New Mexico Institute of Mining and Technology","ror":"https://ror.org/005p9kw61","country_code":"US","type":"education","lineage":["https://openalex.org/I207123951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew H. Sung","raw_affiliation_strings":["Department of Computer Science, New Mexico Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, New Mexico Technology, USA","institution_ids":["https://openalex.org/I207123951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011091110"],"corresponding_institution_ids":["https://openalex.org/I76903346"],"apc_list":null,"apc_paid":null,"fwci":0.3512,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68334929,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2578","issue":null,"first_page":"1562","last_page":"1567"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8120096325874329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7444637417793274},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7375404834747314},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7026510238647461},{"id":"https://openalex.org/keywords/least-significant-bit","display_name":"Least significant bit","score":0.6968485116958618},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6708911061286926},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6501504182815552},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5539360642433167},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.491193026304245},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4722161889076233},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.46471676230430603},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46270397305488586},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2221851646900177}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8120096325874329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7444637417793274},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7375404834747314},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7026510238647461},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.6968485116958618},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6708911061286926},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6501504182815552},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5539360642433167},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.491193026304245},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4722161889076233},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.46471676230430603},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46270397305488586},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2221851646900177},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn.2008.4634004","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2008.4634004","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W128690574","https://openalex.org/W1511029398","https://openalex.org/W1535817554","https://openalex.org/W1748609398","https://openalex.org/W1760530029","https://openalex.org/W1806317803","https://openalex.org/W1922017469","https://openalex.org/W1968590503","https://openalex.org/W1988960566","https://openalex.org/W2016288414","https://openalex.org/W2017337590","https://openalex.org/W2076312302","https://openalex.org/W2080348090","https://openalex.org/W2096050104","https://openalex.org/W2102511552","https://openalex.org/W2124776405","https://openalex.org/W2130424402","https://openalex.org/W2135852508","https://openalex.org/W2139643804","https://openalex.org/W2143426320","https://openalex.org/W2153615901","https://openalex.org/W2156909104","https://openalex.org/W2158162781","https://openalex.org/W2158320630","https://openalex.org/W2503107053","https://openalex.org/W3099514962","https://openalex.org/W3127303521","https://openalex.org/W4205699531","https://openalex.org/W4230674625","https://openalex.org/W4250857377","https://openalex.org/W6605213837","https://openalex.org/W6630721948","https://openalex.org/W6637974747","https://openalex.org/W6678851513","https://openalex.org/W6680389264"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2205085860","https://openalex.org/W2134958869","https://openalex.org/W2059133021","https://openalex.org/W2977151837","https://openalex.org/W2771684231","https://openalex.org/W2158736088","https://openalex.org/W4297776738","https://openalex.org/W2144721898","https://openalex.org/W4387195702"],"abstract_inverted_index":{"One":[0],"of":[1,9,12,43,65,86,93,115,122,131,151,157,168,186],"the":[2,6,10,39,63,84,128,149,155,158,190,194],"Internet\u2019s":[3],"hallmark":[4],"is":[5,31,52,117,121],"rapid":[7],"spread":[8],"use":[11],"information":[13,24,36],"and":[14,73,77,109,136,145,170,182],"communication":[15],"technology.":[16],"This":[17],"has":[18,46],"boosted":[19],"methods":[20,48,103,139],"for":[21,49,193],"hiding":[22],"stego":[23,116],"inside":[25],"digital":[26],"cover":[27],"content":[28],"images":[29,135],"which":[30,51,79],"a":[32,53],"concerning":[33],"issue":[34],"in":[35],"security.":[37],"On":[38],"other":[40],"hand,":[41],"attack":[42],"steganographic":[44],"schemes":[45],"leveraged":[47],"steganalysis":[50],"challenging":[54],"problem.":[55],"In":[56],"this":[57],"paper,":[58],"first":[59],"we":[60],"look":[61,126],"at":[62,127],"design":[64],"classifiers,":[66],"such":[67],"as,":[68],"Support":[69],"Vector":[70],"Machines":[71],"(SVM)":[72],"neural":[74],"networks":[75],"(RBF":[76],"MLP)":[78],"are":[80,172],"able":[81,177],"to":[82,125,142,160,178],"detect":[83],"presence":[85],"Least":[87],"Significant":[88],"Bit":[89],"(LSB)":[90],"matching":[91],"steganography":[92],"gray":[94],"scale":[95],"images.":[96],"Second,":[97],"by":[98,174],"combining":[99],"with":[100,180],"feature":[101],"ranking":[102,138],"(SVM-Recursive":[104],"Feature":[105],"Elimination,":[106],"Kruskal":[107],"Wallis)":[108],"reduction":[110],"techniques":[111],"(PCA)":[112],"pattern":[113],"classification":[114],"successfully":[118],"achieved.":[119],"It":[120],"utmost":[123],"importance":[124],"large":[129],"set":[130],"features":[132],"extracted":[133],"from":[134],"find":[137],"able,":[140],"namely,":[141],"exclude":[143],"correlated":[144],"redundant":[146],"features,":[147],"avoid":[148],"curse":[150],"dimensionality":[152],"or":[153],"circumvent":[154],"need":[156],"steganalyzer":[159],"be":[161],"re-designed.":[162],"Results":[163],"show":[164],"that":[165],"desirable":[166],"properties":[167],"robustness":[169],"resilience":[171],"attained":[173],"designing":[175],"classifiers":[176,187],"deal":[179],"redundancy":[181],"noise.":[183],"Moreover,":[184],"comparison":[185],"performance":[188],"emphasizes":[189],"chosen":[191],"model":[192],"steganalyser.":[195]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
