“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”