{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:22:59Z","timestamp":1776529379301,"version":"3.51.2"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030113889","type":"print"},{"value":"9783030113896","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_5","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"55-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Provably Secure Generative Steganography Based on Autoregressive Model"],"prefix":"10.1007","author":[{"given":"Kuan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inf. Forensics Secur. 5(4), 705\u2013720 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59\u201368. ACM (2013)","DOI":"10.1145\/2482513.2482514"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210. IEEE (2014)","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221\u2013234 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 48\u201353. IEEE (2014)","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"X Guanshuo","year":"2016","unstructured":"Guanshuo, X., Han-Zhou, W., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"5_CR10","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"5_CR11","unstructured":"Goodfellow, I.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"5_CR12","unstructured":"Larochelle, H., Murray, I.: The neural autoregressive distribution estimator. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 29\u201337 (2011)"},{"key":"5_CR13","unstructured":"Theis, L., Bethge, M.: Generative image modeling using spatial LSTMs. In: Advances in Neural Information Processing Systems, pp. 1927\u20131935 (2015)"},{"key":"5_CR14","unstructured":"van den Oord, A., Kalchbrenner, N., Kavukcuoglu, K.: Pixel recurrent neural networks. arXiv preprint arXiv:1601.06759 (2016)"},{"key":"5_CR15","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: Advances in Neural Information Processing Systems, pp. 1951\u20131960 (2017)"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TIP.2014.2371246","volume":"24","author":"K-C Wu","year":"2015","unstructured":"Wu, K.-C., Wang, C.-M.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130\u2013139 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123\u2013132. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_11"},{"key":"5_CR18","unstructured":"van den Oord, A., Kalchbrenner, N., Espeholt, L., Vinyals, O., Graves, A., et al.: Conditional image generation with pixelCNN decoders. In: Advances in Neural Information Processing Systems, pp. 4790\u20134798 (2016)"},{"key":"5_CR19","unstructured":"Salimans, T., Karpathy, A., Chen, X., Kingma, D.P.: PixelCNN++: improving the pixelCNN with discretized logistic mixture likelihood and other modifications. arXiv preprint arXiv:1701.05517 (2017)"},{"issue":"7","key":"5_CR20","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/97.769360","volume":"6","author":"GA Triantafyllidis","year":"1999","unstructured":"Triantafyllidis, G.A., Strintzis, M.G.: A context based adaptive arithmetic coding technique for lossless image compression. IEEE Signal Process. Lett. 6(7), 168\u2013170 (1999)","journal-title":"IEEE Signal Process. Lett."},{"key":"5_CR21","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Rejection_sampling#Advantages_over_sampling_using_naive_methods"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-45708-9_6","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"NJ Hopper","year":"2002","unstructured":"Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77\u201392. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_6"},{"key":"5_CR23","unstructured":"Frey dataset. http:\/\/www.cs.nyu.edu\/~roweis\/data\/frey_rawface.mat"},{"key":"5_CR24","unstructured":"Anime dataset. https:\/\/drive.google.com\/file\/d\/1yOrpEjEYU8LXl8h-k7gVaaQ0ZdGYfnU_\/view?usp=sharing"},{"key":"5_CR25","unstructured":"Volkhonskiy, D., Borisenko, B., Burnaev, E.: Generative adversarial networks for image steganography (2016)"},{"key":"5_CR26","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: Secure steganography based on generative adversarial networks. arXiv preprint arXiv:1707.01613 (2017)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:53:00Z","timestamp":1709823180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}