{"id":"https://openalex.org/W2921003482","doi":"https://doi.org/10.23919/apsipa.2018.8659589","title":"Deep Learning with Feature Reuse for JPEG Image Steganalysis","display_name":"Deep Learning with Feature Reuse for JPEG Image Steganalysis","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2921003482","doi":"https://doi.org/10.23919/apsipa.2018.8659589","mag":"2921003482"},"language":"en","primary_location":{"id":"doi:10.23919/apsipa.2018.8659589","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102991695","display_name":"Jianhua Yang","orcid":"https://orcid.org/0000-0003-0925-1730"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhua Yang","raw_affiliation_strings":["Guangdong Key lab of Information Security, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key lab of Information Security, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key lab of Information Security, Sun Yat-Sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key lab of Information Security, Sun Yat-Sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011184683","display_name":"Edward K. Wong","orcid":"https://orcid.org/0000-0002-9292-5881"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Edward K. Wong","raw_affiliation_strings":["Computer Science and Engineering, New York University, NY, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, New York University, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111876760","display_name":"Yun-Qing Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yun-Qing Shi","raw_affiliation_strings":["Department of ECE, New Jersey Institute of Technology, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, New Jersey Institute of Technology, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102991695"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.1062,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.50207091,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"533","last_page":"538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9323880076408386},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7966270446777344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7636260986328125},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7016885280609131},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6732292175292969},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6457065343856812},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.63559490442276},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6255600452423096},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4977777302265167},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4888448119163513},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.46173250675201416},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.4457891583442688},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.43260687589645386},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.41288867592811584},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.38527733087539673}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9323880076408386},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7966270446777344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7636260986328125},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7016885280609131},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6732292175292969},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6457065343856812},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.63559490442276},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6255600452423096},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4977777302265167},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4888448119163513},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.46173250675201416},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.4457891583442688},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.43260687589645386},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.41288867592811584},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.38527733087539673},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/apsipa.2018.8659589","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659589","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1663899164","https://openalex.org/W1836465849","https://openalex.org/W1973466159","https://openalex.org/W2045110448","https://openalex.org/W2055625960","https://openalex.org/W2071451750","https://openalex.org/W2104705565","https://openalex.org/W2117539524","https://openalex.org/W2124664712","https://openalex.org/W2155893237","https://openalex.org/W2170598445","https://openalex.org/W2194775991","https://openalex.org/W2322622188","https://openalex.org/W2339370745","https://openalex.org/W2416075718","https://openalex.org/W2514127746","https://openalex.org/W2565257220","https://openalex.org/W2610979719","https://openalex.org/W2621048556","https://openalex.org/W2733608110","https://openalex.org/W2735904389","https://openalex.org/W2739185626","https://openalex.org/W2793291280","https://openalex.org/W2963446712","https://openalex.org/W3104001863","https://openalex.org/W6638667902","https://openalex.org/W6661850309","https://openalex.org/W6668300802","https://openalex.org/W6741889044"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W1529294424","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W2357125417","https://openalex.org/W1966340347","https://openalex.org/W1716757876"],"abstract_inverted_index":{"It":[0],"is":[1],"challenging":[2],"to":[3],"detect":[4],"weak":[5],"hidden":[6],"information":[7],"in":[8,52,102],"a":[9,18],"JPEG":[10,82],"compressed":[11],"image.":[12],"In":[13],"this":[14],"paper,":[15],"we":[16],"propose":[17],"32-layer":[19],"convolutional":[20],"neural":[21],"networks":[22],"(CNNs)":[23],"with":[24,79,95],"feature":[25],"reuse":[26],"by":[27,122],"concatenating":[28],"all":[29],"features":[30,48],"from":[31],"previous":[32],"layers.":[33],"The":[34,64],"proposed":[35,54,70,115],"method":[36,71,88,97,100,116],"can":[37,117],"improve":[38],"the":[39,46,53,59,69,74,80,90,114],"flow":[40],"of":[41,61],"gradient":[42],"and":[43,45,49,89,98,124],"information,":[44],"shared":[47],"bottleneck":[50],"layers":[51],"CNN":[55],"model":[56],"further":[57],"reduce":[58,73,118],"number":[60],"parameters":[62],"dramatically.":[63],"experimental":[65],"results":[66],"shown":[67],"that":[68],"significantly":[72],"detection":[75,119],"error":[76,120],"rate":[77,121],"compared":[78],"existing":[81],"steganalysis":[83],"methods,":[84],"e.g.":[85],"state-of-the-art":[86],"XuNet":[87,96],"conventional":[91,99],"SCA-GFR":[92,101],"method.":[93],"Compared":[94],"detecting":[103],"J-UNIWARD":[104],"at":[105],"0.1":[106],"bpnzAC":[107],"(bit":[108],"per":[109],"non-zero":[110],"AC":[111],"DCT":[112],"coefficient),":[113],"4.33%":[123],"6.55%":[125],"respectively.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2025-10-10T00:00:00"}
