{"id":"https://openalex.org/W4412040129","doi":"https://doi.org/10.32604/cmc.2025.067252","title":"Image Steganalysis Based on an Adaptive Attention Mechanism and Lightweight DenseNet","display_name":"Image Steganalysis Based on an Adaptive Attention Mechanism and Lightweight DenseNet","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412040129","doi":"https://doi.org/10.32604/cmc.2025.067252"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067252","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067252","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067252","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090454892","display_name":"Zhenxiang He","orcid":"https://orcid.org/0009-0007-6458-6820"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhenxiang He","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111291752","display_name":"Ruilin Wu","orcid":"https://orcid.org/0000-0002-1784-8716"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rulin Wu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634221","display_name":"Xinyuan Wang","orcid":"https://orcid.org/0009-0006-8330-342X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinyuan Wang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5090454892"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.6997,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.90703838,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"85","issue":"1","first_page":"1631","last_page":"1651"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.941891610622406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.739303708076477},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5206781625747681},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5155084133148193},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.45136523246765137},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.3788111209869385},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36033451557159424},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3416711091995239},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05482518672943115}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.941891610622406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.739303708076477},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5206781625747681},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5155084133148193},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.45136523246765137},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3788111209869385},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36033451557159424},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3416711091995239},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05482518672943115},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067252","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067252","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067252","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067252","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2009130368","https://openalex.org/W2076312302","https://openalex.org/W2109255472","https://openalex.org/W2322622188","https://openalex.org/W2621048556","https://openalex.org/W2892948265","https://openalex.org/W2915309887","https://openalex.org/W2969585684","https://openalex.org/W4205487339","https://openalex.org/W4384304031","https://openalex.org/W4386536149","https://openalex.org/W4388983832","https://openalex.org/W4392520145","https://openalex.org/W4400643948","https://openalex.org/W4402978328","https://openalex.org/W4404704192","https://openalex.org/W4405989449","https://openalex.org/W4407125567"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2792878404","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W3154843532"],"abstract_inverted_index":{"With":[0],"the":[1,7,20,76,85,118,138,141,146,150,163,168,173,177,192,198,202,207,211,229,261,265,275,290,307,316,320,324,335,348,353,362,375],"continuous":[2],"advancement":[3],"of":[4,9,22,87,120,134,167,197,295,309,319,352,364,377],"steganographic":[5,121,174],"techniques,":[6],"task":[8],"image":[10,108,169],"steganalysis":[11,109,365],"has":[12],"become":[13],"increasingly":[14],"challenging,":[15],"posing":[16],"significant":[17],"obstacles":[18],"to":[19,53,61,112,161,170,190,227,251,256,273],"fields":[21,376],"information":[23,67,122,166,203,378],"security":[24,379],"and":[25,116,127,145,195,200,222,233,246,280,292,332,340,350,380],"digital":[26,381],"forensics.":[27,382],"Although":[28],"existing":[29,325],"deep":[30,107,208],"learning":[31],"methods":[32,50],"have":[33],"achieved":[34],"certain":[35],"progress":[36],"in":[37,45,95,206,237],"steganography":[38,57,88,281,296],"detection,":[39,297],"they":[40],"still":[41],"encounter":[42],"several":[43],"difficulties":[44],"real-world":[46],"applications.":[47],"Specifically,":[48],"current":[49],"often":[51],"struggle":[52],"accurately":[54],"focus":[55],"on":[56,260,334],"sensitive":[58],"regions,":[59],"leading":[60],"limited":[62],"detection":[63,89,114,317,372],"accuracy.":[64],"Moreover,":[65],"feature":[66,125,142,212,230,234,254],"is":[68,159,188,225,249],"frequently":[69],"lost":[70],"during":[71],"transmission,":[72],"which":[73],"further":[74,346],"reduces":[75],"model\u2019s":[77],"generalization":[78,293],"ability.":[79],"These":[80,283,357],"issues":[81],"not":[82,286,359],"only":[83,287,360],"compromise":[84],"reliability":[86],"but":[90,298,367],"also":[91,299,368],"hinder":[92],"its":[93],"applicability":[94],"complex":[96],"scenarios.":[97],"To":[98],"address":[99],"these":[100],"challenges,":[101],"this":[102],"paper":[103],"proposes":[104],"a":[105,153,180,215,239,301],"novel":[106],"network":[110,132,304,355],"designed":[111,250],"enhance":[113,172,191],"accuracy":[115,291],"improve":[117,228,289],"retention":[119,196],"through":[123],"multilevel":[124],"optimization":[126],"global":[128],"perceptual":[129],"modeling.":[130],"The":[131],"consists":[133],"three":[135],"core":[136],"modules:":[137],"preprocessing":[139,151],"module,":[140,144],"extraction":[143,213,231],"classification":[147,266],"module.":[148],"In":[149,210],"stage,":[152,214],"Spatial":[154],"Rich":[155],"Model":[156],"(SRM)":[157],"filter":[158],"introduced":[160],"extract":[162],"high-frequency":[164],"residual":[165],"initially":[171],"features;":[175],"at":[176],"same":[178],"time,":[179],"lightweight":[181],"Densely":[182],"Connected":[183],"Convolutional":[184],"Networks":[185],"(DenseNet)":[186],"structure":[187,218,305],"proposed":[189,321,354],"effective":[193,276],"transmission":[194],"features":[199],"alleviate":[201],"loss":[204],"problem":[205],"network.":[209],"hybrid":[216],"modeling":[217],"combining":[219],"depth-separated":[220],"convolution":[221,224],"ordinary":[223],"constructed":[226],"efficiency":[232],"description":[235],"capability;":[236],"addition,":[238],"dual-domain":[240],"adaptive":[241],"attention":[242],"mechanism":[243],"integrating":[244],"channel":[245],"spatial":[247],"dimensions":[248],"dynamically":[252],"allocate":[253],"weights":[255],"achieve":[257],"precise":[258],"focusing":[259],"steganography-sensitive":[262],"region.":[263],"Finally,":[264],"module":[267],"adopts":[268],"dual":[269],"fully":[270],"connected":[271],"layers":[272],"realize":[274],"differentiation":[277],"between":[278],"coverage":[279],"maps.":[282],"innovative":[284],"designs":[285],"effectively":[288],"ability":[294],"provide":[300,369],"new":[302],"efficient":[303],"for":[306,374],"field":[308],"steganalysis.":[310],"Numerous":[311],"experimental":[312],"results":[313,358],"show":[314],"that":[315],"performance":[318],"method":[322],"outperforms":[323],"mainstream":[326],"methods,":[327],"such":[328],"as":[329],"SR-Net,":[330],"TSNet,":[331],"CVTStego-Net,":[333],"publicly":[336],"available":[337],"dataset":[338],"BOSSbase":[339],"BOSW2.":[341],"Meanwhile,":[342],"multiple":[343],"ablation":[344],"experiments":[345],"validate":[347],"validity":[349],"reasonableness":[351],"structure.":[356],"promote":[361],"development":[363],"technology":[366],"more":[370],"reliable":[371],"tools":[373]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
