{"id":"https://openalex.org/W2954070450","doi":"https://doi.org/10.1109/wifs47025.2019.9035096","title":"Pooled Steganalysis in JPEG: how to deal with the spreading strategy?","display_name":"Pooled Steganalysis in JPEG: how to deal with the spreading strategy?","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W2954070450","doi":"https://doi.org/10.1109/wifs47025.2019.9035096","mag":"2954070450"},"language":"en","primary_location":{"id":"doi:10.1109/wifs47025.2019.9035096","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9035096","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1906.11525","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ahmad ZAKARIA","orcid":null},"institutions":[{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Ahmad ZAKARIA","raw_affiliation_strings":["LIRMM, Univ Montpellier, CNRS, France","Image & Interaction"],"affiliations":[{"raw_affiliation_string":"LIRMM, Univ Montpellier, CNRS, France","institution_ids":["https://openalex.org/I4210101743","https://openalex.org/I19894307","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Image & Interaction","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050689933","display_name":"Marc Chaumont","orcid":"https://orcid.org/0000-0002-4095-4410"},"institutions":[{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]},{"id":"https://openalex.org/I66456633","display_name":"Universit\u00e9 de N\u00eemes","ror":"https://ror.org/044t4x544","country_code":"FR","type":"education","lineage":["https://openalex.org/I66456633"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Marc CHAUMONT","raw_affiliation_strings":["LIRMM, Univ Montpellier, CNRS, Univ N\u00eemes, France","Image & Interaction"],"affiliations":[{"raw_affiliation_string":"LIRMM, Univ Montpellier, CNRS, Univ N\u00eemes, France","institution_ids":["https://openalex.org/I66456633","https://openalex.org/I19894307","https://openalex.org/I1294671590","https://openalex.org/I4210101743"]},{"raw_affiliation_string":"Image & Interaction","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004974411","display_name":"G\u00e9rard Subsol","orcid":"https://orcid.org/0000-0002-7461-4932"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I19894307","display_name":"Universit\u00e9 de Montpellier","ror":"https://ror.org/051escj72","country_code":"FR","type":"education","lineage":["https://openalex.org/I19894307"]},{"id":"https://openalex.org/I4210101743","display_name":"Laboratoire d'Informatique, de Robotique et de Micro\u00e9lectronique de Montpellier","ror":"https://ror.org/013yean28","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I151295451","https://openalex.org/I19894307","https://openalex.org/I4210101743","https://openalex.org/I4210159245","https://openalex.org/I4412460525"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Gerard SUBSOL","raw_affiliation_strings":["LIRMM, Univ Montpellier, CNRS, France","Image & Interaction"],"affiliations":[{"raw_affiliation_string":"LIRMM, Univ Montpellier, CNRS, France","institution_ids":["https://openalex.org/I4210101743","https://openalex.org/I19894307","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Image & Interaction","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I19894307","https://openalex.org/I4210101743"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0531276,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.925215482711792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6841257810592651},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6527752876281738},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5362287163734436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5078867077827454},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4859405755996704},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33179938793182373},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.23833462595939636},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10670474171638489}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.925215482711792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6841257810592651},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6527752876281738},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5362287163734436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5078867077827454},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4859405755996704},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33179938793182373},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.23833462595939636},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10670474171638489}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/wifs47025.2019.9035096","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs47025.2019.9035096","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1906.11525","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1906.11525","pdf_url":"https://arxiv.org/pdf/1906.11525","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:HAL:hal-02301698v1","is_oa":true,"landing_page_url":"https://hal.science/hal-02301698","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"WIFS 2019 - 11th IEEE International Workshop on Information Forensics and Security, Dec 2019, Delft, Netherlands. &#x27E8;10.1109/WIFS47025.2019.9035096&#x27E9;","raw_type":"Conference papers"},{"id":"doi:10.48550/arxiv.1906.11525","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1906.11525","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1906.11525","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1906.11525","pdf_url":"https://arxiv.org/pdf/1906.11525","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1658688950","https://openalex.org/W1963536592","https://openalex.org/W2006286269","https://openalex.org/W2007861216","https://openalex.org/W2015802699","https://openalex.org/W2036904261","https://openalex.org/W2041195352","https://openalex.org/W2055625960","https://openalex.org/W2064353916","https://openalex.org/W2101234009","https://openalex.org/W2128974515","https://openalex.org/W2134527668","https://openalex.org/W2170311913","https://openalex.org/W2192227561","https://openalex.org/W2405358909","https://openalex.org/W2543352470","https://openalex.org/W2548008951","https://openalex.org/W2665759771","https://openalex.org/W2736102651","https://openalex.org/W2889107560","https://openalex.org/W2889206230","https://openalex.org/W2902620118","https://openalex.org/W2957604207","https://openalex.org/W6654313321","https://openalex.org/W6675354045","https://openalex.org/W6678945065"],"related_works":["https://openalex.org/W2982078027","https://openalex.org/W3044228448","https://openalex.org/W3010294520","https://openalex.org/W1583984761","https://openalex.org/W2559932874","https://openalex.org/W1968515670","https://openalex.org/W2380379365","https://openalex.org/W2320686274","https://openalex.org/W2115509084","https://openalex.org/W1576926746"],"abstract_inverted_index":{"In":[0],"image":[1,74],"pooled":[2,61,127],"steganalysis,":[3],"a":[4,11,17,21,25,66,91,122,141,183,187,213],"steganalyst,":[5],"Eve,":[6,143],"aims":[7],"to":[8,20,41,64,70,80,121,137,193,201,222],"detect":[9],"if":[10,72,105],"set":[12,87,207],"of":[13,50,88,204,208],"images":[14,180],"sent":[15],"by":[16,140],"steganographer,":[18],"Alice,":[19],"receiver,":[22],"Bob,":[23],"contains":[24],"hidden":[26],"message.":[27],"We":[28],"can":[29,107,115],"reasonably":[30],"assess":[31],"that":[32,104,154,190,219],"the":[33,38,43,48,56,82,86,98,146,163,170,194,202,205,217],"steganalyst":[34],"does":[35,95],"not":[36,96],"know":[37,97],"strategy":[39,157],"used":[40],"spread":[42],"payload":[44,196],"across":[45],"images.":[46],"To":[47],"best":[49],"our":[51],"knowledge,":[52],"in":[53,169,197],"this":[54],"case,":[55],"most":[57],"appropriate":[58],"solution":[59],"for":[60],"steganalysis":[62,118,134],"is":[63,75,153,191,220],"use":[65],"Single-Image":[67],"Detector":[68],"(SID)":[69],"estimate/quantify":[71],"an":[73],"cover":[76],"or":[77,125],"stego,":[78],"and":[79,186,210],"average":[81],"scores":[83],"obtained":[84,139],"on":[85,178,212],"images.In":[89],"such":[90],"scenario,":[92],"where":[93],"Eve":[94,106],"spreading":[99,112,148,156,165,175,226],"strategies,":[100,113],"we":[101],"experimentally":[102],"show":[103],"discriminate":[108],"among":[109],"few":[110],"well-known":[111],"she":[114],"improve":[116],"her":[117],"performances":[119],"compared":[120],"simple":[123],"averaging":[124],"maximum":[126],"approach.":[128],"Our":[129],"discriminative":[130,188],"approach":[131],"allows":[132],"obtaining":[133],"efficiencies":[135],"comparable":[136],"those":[138],"clairvoyant,":[142],"who":[144],"knows":[145],"Alice":[147],"strategy.":[149],"Another":[150],"interesting":[151],"observation":[152],"DeLS":[155],"behaves":[158],"really":[159],"better":[160],"than":[161],"all":[162],"other":[164],"strategies.Those":[166],"observations":[167],"results":[168],"experimentation":[171],"with":[172,181,224],"six":[173],"different":[174],"strategies":[176],"made":[177],"Jpeg":[179],"J-UNIWARD,":[182],"state-of-the-art":[184],"Single-Image-Detector,":[185],"architecture":[189],"invariant":[192,200],"individual":[195],"each":[198],"image,":[199],"size":[203],"analyzed":[206],"images,":[209],"build":[211],"binary":[214],"detector":[215],"(for":[216],"pooling)":[218],"able":[221],"deal":[223],"various":[225],"strategies.":[227]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-07-12T00:00:00"}
