{"id":"https://openalex.org/W2055625960","doi":"https://doi.org/10.1145/2756601.2756608","title":"Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters","display_name":"Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters","publication_year":2015,"publication_date":"2015-06-02","ids":{"openalex":"https://openalex.org/W2055625960","doi":"https://doi.org/10.1145/2756601.2756608","mag":"2055625960"},"language":"en","primary_location":{"id":"doi:10.1145/2756601.2756608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2756601.2756608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103227739","display_name":"Xiaofeng Song","orcid":"https://orcid.org/0000-0002-6409-8401"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xiaofeng Song","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034700690","display_name":"Fenlin Liu","orcid":"https://orcid.org/0000-0001-8019-1713"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fenlin Liu","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102922441","display_name":"Chunfang Yang","orcid":"https://orcid.org/0000-0001-6487-379X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chunfang Yang","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090509213","display_name":"Xiangyang Luo","orcid":"https://orcid.org/0000-0003-3225-4649"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiangyang Luo","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100388291","display_name":"Yi Zhang","orcid":"https://orcid.org/0000-0003-1832-1235"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yi Zhang","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5103227739"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":13.8072,"has_fulltext":false,"cited_by_count":292,"citation_normalized_percentile":{"value":0.99207732,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9534566402435303},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7843016386032104},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7696038484573364},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.7139158844947815},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7001501321792603},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.653060793876648},{"id":"https://openalex.org/keywords/gabor-filter","display_name":"Gabor filter","score":0.6451740264892578},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6277005076408386},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6267251968383789},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5863621234893799},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4964771866798401},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47081810235977173},{"id":"https://openalex.org/keywords/image-texture","display_name":"Image texture","score":0.4121597111225128},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3752165138721466},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.31888025999069214},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2847350835800171}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9534566402435303},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7843016386032104},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7696038484573364},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.7139158844947815},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7001501321792603},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.653060793876648},{"id":"https://openalex.org/C2779883129","wikidata":"https://www.wikidata.org/wiki/Q2447890","display_name":"Gabor filter","level":3,"score":0.6451740264892578},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6277005076408386},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6267251968383789},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5863621234893799},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4964771866798401},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47081810235977173},{"id":"https://openalex.org/C63099799","wikidata":"https://www.wikidata.org/wiki/Q17147001","display_name":"Image texture","level":4,"score":0.4121597111225128},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3752165138721466},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.31888025999069214},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2847350835800171},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2756601.2756608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2756601.2756608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1512190422","https://openalex.org/W1534147215","https://openalex.org/W1760530029","https://openalex.org/W1806317803","https://openalex.org/W1972785987","https://openalex.org/W2006500012","https://openalex.org/W2009130368","https://openalex.org/W2040299224","https://openalex.org/W2044610626","https://openalex.org/W2045110448","https://openalex.org/W2049562124","https://openalex.org/W2071451750","https://openalex.org/W2092401261","https://openalex.org/W2096127742","https://openalex.org/W2104705565","https://openalex.org/W2123170991","https://openalex.org/W2124664712","https://openalex.org/W2130706803","https://openalex.org/W2134527668","https://openalex.org/W2136744314","https://openalex.org/W2167999072","https://openalex.org/W2169552486","https://openalex.org/W2350778671","https://openalex.org/W2538511122","https://openalex.org/W2545241995","https://openalex.org/W2800106282","https://openalex.org/W3147210360","https://openalex.org/W4244214432"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W2241212938","https://openalex.org/W2160587766","https://openalex.org/W2357125417","https://openalex.org/W1529294424"],"abstract_inverted_index":{"Adaptive":[0],"JPEG":[1,99,172],"steganographic":[2],"schemes":[3],"are":[4,21,117,164],"difficult":[5],"to":[6,23,129],"preserve":[7],"the":[8,18,24,54,59,66,76,92,97,114,121,124,131,138,146,158,167],"image":[9,67,79,100],"texture":[10,26,68],"features":[11,69,116,161],"in":[12,53,58],"all":[13,120],"scales":[14,72,109],"and":[15,57,73,110,178],"orientations":[16,111],"when":[17,162],"embedding":[19,85],"changes":[20,77],"constrained":[22],"complicated":[25],"regions,":[27],"then":[28],"a":[29,152],"steganalysis":[30,133,148,160],"feature":[31,94,134,149],"extraction":[32,95],"method":[33],"is":[34,101,127],"proposed":[35,93,132,147],"based":[36],"on":[37],"2":[38],"dimensional":[39],"(2D)":[40],"Gabor":[41,45,105],"filters.":[42],"The":[43,141],"2D":[44,104],"filters":[46,106],"have":[47],"certain":[48],"optimal":[49],"joint":[50],"localization":[51],"properties":[52],"spatial":[55,60],"domain":[56],"frequency":[61],"domain.":[62],"They":[63],"can":[64,86,150],"describe":[65],"from":[70,119],"different":[71,108],"orientations,":[74],"therefore":[75],"of":[78,170],"statistical":[80],"characteristics":[81],"caused":[82],"by":[83,103,155],"steganography":[84,173],"be":[87],"captured":[88],"more":[89],"effectively.":[90],"For":[91],"method,":[96],"decompressed":[98],"filtered":[102,122],"with":[107,157],"firstly.":[112],"Then,":[113],"histogram":[115],"extracted":[118],"images.Lastly,":[123],"ensemble":[125],"classifier":[126],"used":[128,165],"assemble":[130],"as":[135,137,175],"well":[136],"final":[139],"steganalyzer.":[140],"experimental":[142],"results":[143],"show":[144],"that":[145],"achieve":[151],"competitive":[153],"performance":[154,169],"comparing":[156],"other":[159],"they":[163],"for":[166],"detection":[168],"adaptive":[171],"such":[174],"UED,":[176],"JUNIWARD":[177],"SI-UNIWARD.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":28},{"year":2021,"cited_by_count":35},{"year":2020,"cited_by_count":47},{"year":2019,"cited_by_count":43},{"year":2018,"cited_by_count":34},{"year":2017,"cited_by_count":28},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
