{"id":"https://openalex.org/W2905190780","doi":"https://doi.org/10.7287/peerj.preprints.27339v1","title":"A false negative study of the steganalysis tool: Stegdetect","display_name":"A false negative study of the steganalysis tool: Stegdetect","publication_year":2018,"publication_date":"2018-11-12","ids":{"openalex":"https://openalex.org/W2905190780","doi":"https://doi.org/10.7287/peerj.preprints.27339v1","mag":"2905190780"},"language":"en","primary_location":{"id":"doi:10.7287/peerj.preprints.27339v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.27339v1","pdf_url":"https://peerj.com/preprints/27339.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://peerj.com/preprints/27339.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063706430","display_name":"Benjamin Aziz","orcid":"https://orcid.org/0000-0001-5089-2025"},"institutions":[{"id":"https://openalex.org/I63072094","display_name":"University of Portsmouth","ror":"https://ror.org/03ykbk197","country_code":"GB","type":"education","lineage":["https://openalex.org/I63072094"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Benjamin Aziz","raw_affiliation_strings":["School of Computing, University of Portsmouth, Hampshire, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Portsmouth, Hampshire, United Kingdom","institution_ids":["https://openalex.org/I63072094"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080289677","display_name":"Jeyong Jung","orcid":"https://orcid.org/0000-0001-9116-1421"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeyong Jung","raw_affiliation_strings":["Seoul Metropolitan Police Agency, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Seoul Metropolitan Police Agency, Seoul, South Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063706430"],"corresponding_institution_ids":["https://openalex.org/I63072094"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15262256,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.9735064506530762},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8673068881034851},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6942532658576965},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.665549635887146},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.6565868854522705},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6501610279083252},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.6416401267051697},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5011076927185059},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5008387565612793},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4296773076057434},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3937075436115265},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3769277036190033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37362226843833923},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.26727426052093506},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08878821134567261}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.9735064506530762},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8673068881034851},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6942532658576965},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.665549635887146},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.6565868854522705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6501610279083252},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.6416401267051697},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5011076927185059},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5008387565612793},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4296773076057434},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3937075436115265},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3769277036190033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37362226843833923},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.26727426052093506},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08878821134567261},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.7287/peerj.preprints.27339v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.27339v1","pdf_url":"https://peerj.com/preprints/27339.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},{"id":"pmh:oai:bucks.collections.crest.ac.uk:18860","is_oa":false,"landing_page_url":"https://bnu.repository.guildhe.ac.uk/id/eprint/18860/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400999","display_name":"Bucks New University Repository (Bucks New University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I19668297","host_organization_name":"Buckinghamshire New University","host_organization_lineage":["https://openalex.org/I19668297"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:researchportal.port.ac.uk:publications/4712ed75-ac64-4948-8840-268b3748a8bc","is_oa":true,"landing_page_url":"https://www.mdpi.com/2076-3417/10/22/8188","pdf_url":null,"source":{"id":"https://openalex.org/S4306401774","display_name":"Portsmouth Research Portal (University of Portsmouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63072094","host_organization_name":"University of Portsmouth","host_organization_lineage":["https://openalex.org/I63072094"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.7287/peerj.preprints.27339v1","is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.27339v1","pdf_url":"https://peerj.com/preprints/27339.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"posted-content"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2905190780.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4220747575","https://openalex.org/W2133743319","https://openalex.org/W127724361","https://openalex.org/W2032334298","https://openalex.org/W4200085651","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W4294309378","https://openalex.org/W2088023168","https://openalex.org/W2355413035"],"abstract_inverted_index":{"Steganography":[0,16],"and":[1,152],"Steganalysis":[2],"in":[3,33,46],"recent":[4],"years":[5],"have":[6],"become":[7],"an":[8,110],"important":[9],"area":[10],"of":[11,20,42,56,73,94,108,112,117,160,174,191],"research":[12],"involving":[13],"dierent":[14],"applications.":[15],"is":[17,39,97,166],"the":[18,40,47,57,113,124,131,136,145,154,187],"process":[19,41],"hiding":[21,44],"secret":[22],"data":[23],"into":[24,88,181],"any":[25,29],"digital":[26,100],"media":[27],"without":[28],"signicant":[30],"notable":[31],"changes":[32],"a":[34,71,84,139,171],"cover":[35,48],"object,":[36],"while":[37],"steganalysis":[38,60],"detecting":[43],"content":[45],"object.":[49],"In":[50,75],"this":[51,95],"study,":[52],"we":[53,78],"evaluated":[54],"one":[55],"modern":[58],"automated":[59],"tools,":[61],"Stegdetect,":[62],"to":[63,82,98,150,179,185],"study":[64,96,120],"its":[65],"false":[66,114,125,141,188],"negative":[67,115,126,142,189],"rates":[68,116,127,190],"when":[69,169],"analysing":[70,170],"bulk":[72,173],"images.":[74,91],"so":[76],"doing,":[77],"used":[79],"JPHide":[80,161],"method":[81,162],"embed":[83],"randomly":[85],"generated":[86],"messages":[87],"2000":[89],"JPEG":[90],"The":[92],"aim":[93],"help":[99],"forensics":[101],"analysts":[102,177],"during":[103],"their":[104],"investigations":[105],"by":[106],"means":[107],"providing":[109],"idea":[111],"Stegdetect.":[118,192],"This":[119],"found":[121],"that":[122,168],"(1)":[123],"depended":[128],"largely":[129],"on":[130],"tool's":[132],"sensitivity":[133,146,156,183],"values,":[134],"(2)":[135],"tool":[137],"had":[138],"high":[140],"rate":[143],"between":[144],"values":[147,184],"from":[148],"0.1":[149],"3.4":[151],"(3)":[153],"best":[155],"value":[157],"for":[158],"detection":[159],"was":[163],"6.2.":[164],"It":[165],"recommended":[167],"huge":[172],"images":[175],"forensic":[176],"need":[178],"take":[180],"consideration":[182],"reduce":[186]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
