{"id":"https://openalex.org/W4400976666","doi":"https://doi.org/10.1145/3664476.3670911","title":"Single-image steganalysis in real-world scenarios based on classifier inconsistency detection","display_name":"Single-image steganalysis in real-world scenarios based on classifier inconsistency detection","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400976666","doi":"https://doi.org/10.1145/3664476.3670911"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670911","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081645470","display_name":"Daniel Lerch-Hostalot","orcid":"https://orcid.org/0000-0003-2602-672X"},"institutions":[{"id":"https://openalex.org/I138847295","display_name":"Universitat Oberta de Catalunya","ror":"https://ror.org/01f5wp925","country_code":"ES","type":"education","lineage":["https://openalex.org/I138847295"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Daniel Lerch-Hostalot","raw_affiliation_strings":["Universitat Oberta de Catalunya, Spain"],"affiliations":[{"raw_affiliation_string":"Universitat Oberta de Catalunya, Spain","institution_ids":["https://openalex.org/I138847295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044117915","display_name":"David Meg\u00edas","orcid":"https://orcid.org/0000-0002-0507-7731"},"institutions":[{"id":"https://openalex.org/I138847295","display_name":"Universitat Oberta de Catalunya","ror":"https://ror.org/01f5wp925","country_code":"ES","type":"education","lineage":["https://openalex.org/I138847295"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"David Meg\u00edas Jimenez","raw_affiliation_strings":["Universitat Oberta de Catalunya, Spain"],"affiliations":[{"raw_affiliation_string":"Universitat Oberta de Catalunya, Spain","institution_ids":["https://openalex.org/I138847295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5081645470"],"corresponding_institution_ids":["https://openalex.org/I138847295"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10570478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9660087823867798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6744042634963989},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6594074964523315},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6298953294754028},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5072569251060486},{"id":"https://openalex.org/keywords/contextual-image-classification","display_name":"Contextual image classification","score":0.46903595328330994},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.42513972520828247},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3435262441635132},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3041185736656189}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9660087823867798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6744042634963989},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6594074964523315},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6298953294754028},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5072569251060486},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.46903595328330994},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.42513972520828247},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3435262441635132},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3041185736656189}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670911","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3664476.3670911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1976570511","https://openalex.org/W2007861216","https://openalex.org/W2009130368","https://openalex.org/W2108598243","https://openalex.org/W2167999072","https://openalex.org/W2170311913","https://openalex.org/W2170598445","https://openalex.org/W2293496905","https://openalex.org/W2892948265","https://openalex.org/W2960934316","https://openalex.org/W2979690817","https://openalex.org/W3037490193","https://openalex.org/W3133560326","https://openalex.org/W3135611284","https://openalex.org/W3173290060","https://openalex.org/W4206895539","https://openalex.org/W4385688306","https://openalex.org/W4390910170"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W2792878404","https://openalex.org/W3154843532"],"abstract_inverted_index":{"This":[0,85],"paper":[1],"presents":[2],"an":[3],"improved":[4],"method":[5,31,77,86,122],"for":[6,17,165],"estimating":[7,134],"the":[8,20,41,71,74,89,93,97,105,129],"accuracy":[9,136],"of":[10,23,38,62,73,96,107,128,146],"a":[11,34,60,65,162],"model":[12,135],"based":[13],"on":[14],"images":[15,39,63,91],"intended":[16],"prediction,":[18],"enhancing":[19],"standard":[21,75],"Detection":[22],"Classifier":[24],"Inconsistencies":[25],"(DCI)":[26],"method.":[27],"The":[28,144],"conventional":[29],"DCI":[30,76,131],"typically":[32],"requires":[33],"large":[35],"enough":[36],"set":[37,61],"from":[40,64],"same":[42],"source":[43,157],"to":[44,126],"provide":[45],"accurate":[46],"estimations,":[47],"which":[48],"limits":[49],"its":[50],"practicality.":[51],"Our":[52],"enhanced":[53],"approach":[54,148],"overcomes":[55],"this":[56],"limitation":[57],"by":[58],"generating":[59],"single":[66],"original":[67],"image,":[68],"thereby":[69],"enabling":[70],"application":[72],"without":[78],"requiring":[79],"more":[80],"than":[81],"one":[82],"target":[83],"image.":[84],"ensures":[87],"that":[88,120],"generated":[90,142],"maintain":[92],"statistical":[94],"properties":[95],"original,":[98],"preserving":[99],"any":[100],"embedded":[101],"steganographic":[102],"messages,":[103],"through":[104],"use":[106],"non-destructive":[108],"image":[109],"manipulations":[110],"such":[111],"as":[112,138,140],"flips,":[113],"rotations,":[114],"and":[115],"shifts.":[116],"Experimental":[117],"results":[118,124],"demonstrate":[119],"our":[121,147],"produces":[123],"comparable":[125],"those":[127],"traditional":[130],"method,":[132],"effectively":[133],"with":[137],"few":[139],"32":[141],"images.":[143],"robustness":[145],"is":[149],"also":[150],"confirmed":[151],"in":[152],"challenging":[153],"scenarios":[154],"involving":[155],"cover":[156],"mismatch":[158],"(CSM),":[159],"making":[160],"it":[161],"viable":[163],"solution":[164],"real-world":[166],"applications.":[167]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
