{"id":"https://openalex.org/W2919180131","doi":"https://doi.org/10.1145/3297156.3297212","title":"Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography","display_name":"Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography","publication_year":2018,"publication_date":"2018-12-08","ids":{"openalex":"https://openalex.org/W2919180131","doi":"https://doi.org/10.1145/3297156.3297212","mag":"2919180131"},"language":"en","primary_location":{"id":"doi:10.1145/3297156.3297212","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297212","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101825789","display_name":"Xiaoyan Xu","orcid":"https://orcid.org/0009-0000-6483-7553"},"institutions":[{"id":"https://openalex.org/I4210148639","display_name":"Wuhan Engineering Science & Technology Institute","ror":"https://ror.org/04ez3r306","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210148639"]},{"id":"https://openalex.org/I4210091712","display_name":"Zhengzhou University of Science and Technology","ror":"https://ror.org/00b3j7936","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210091712"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Xu","raw_affiliation_strings":["Zhengzhou Science and Technology Institute, Zhenzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Science and Technology Institute, Zhenzhou, China","institution_ids":["https://openalex.org/I4210091712","https://openalex.org/I4210148639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103227739","display_name":"Xiaofeng Song","orcid":"https://orcid.org/0000-0002-6409-8401"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Song","raw_affiliation_strings":["National University of Defense Technology, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, Xi'an, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113746674","display_name":"Rongcai Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148639","display_name":"Wuhan Engineering Science & Technology Institute","ror":"https://ror.org/04ez3r306","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210148639"]},{"id":"https://openalex.org/I4210091712","display_name":"Zhengzhou University of Science and Technology","ror":"https://ror.org/00b3j7936","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210091712"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongcai Zhao","raw_affiliation_strings":["Zhengzhou Science and Technology Institute, Zhenzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Science and Technology Institute, Zhenzhou, China","institution_ids":["https://openalex.org/I4210091712","https://openalex.org/I4210148639"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101825789"],"corresponding_institution_ids":["https://openalex.org/I4210091712","https://openalex.org/I4210148639"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.23758594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"375","last_page":"379"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8643198609352112},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7672272324562073},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7189666032791138},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6325371265411377},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6139711737632751},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6003393530845642},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5534741878509521},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5425501465797424},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.48311305046081543},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4720419645309448},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4273239076137543},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32596251368522644},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.18134981393814087}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8643198609352112},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7672272324562073},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7189666032791138},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6325371265411377},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6139711737632751},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6003393530845642},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5534741878509521},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5425501465797424},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.48311305046081543},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4720419645309448},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4273239076137543},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32596251368522644},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.18134981393814087},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3297156.3297212","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297212","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1955882805","https://openalex.org/W1973466159","https://openalex.org/W1976570511","https://openalex.org/W2055625960","https://openalex.org/W2059019537","https://openalex.org/W2099111195","https://openalex.org/W2104705565","https://openalex.org/W2123170991","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2277839806","https://openalex.org/W2339370745","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2579698629","https://openalex.org/W2736148246"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1529294424","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W2357125417"],"abstract_inverted_index":{"Content-adaptive":[0],"image":[1],"steganography":[2,46,72],"constrains":[3],"the":[4,8,25,38,66,76,89,96,98,101,107,113],"embedding":[5,17,67],"changes":[6],"to":[7,12],"complex":[9],"regions":[10],"difficult":[11],"model":[13],"by":[14],"using":[15],"heuristic":[16],"distortion":[18],"function":[19],"and":[20,51,88],"STCs.":[21],"It":[22],"can":[23,111],"achieve":[24],"good":[26],"anti-detection":[27],"ability,":[28],"however,":[29],"its":[30],"selection":[31,41],"channel":[32,42],"is":[33,49,63,73,86,93],"public.":[34],"In":[35,95],"this":[36],"paper,":[37],"utilization":[39],"of":[40,43,69],"content-adaptive":[44,70],"JPEG":[45,71],"for":[47],"steganalysis":[48,103,109],"studied":[50],"a":[52],"selection-channel-aware":[53,77],"scale":[54,78],"co-occurrence":[55,79],"matrix":[56,80],"feature":[57,110],"based":[58,81],"on":[59,82],"2D":[60,83],"Gabor":[61,84],"filter":[62,85],"proposed.":[64],"Firstly,":[65],"change":[68],"analyzed.":[74],"Then,":[75],"proposed":[87,108],"detailed":[90],"extraction":[91],"process":[92],"shown.":[94],"experiments,":[97],"comparisons":[99],"with":[100],"other":[102],"features":[104],"show":[105],"that":[106],"obtain":[112],"competitive":[114],"detection":[115],"performances.":[116]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
