{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:45:34Z","timestamp":1743093934157,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_11","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks"],"prefix":"10.1007","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Kun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"issue":"5","key":"11_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Process. Lett."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) Information Hiding, pp. 161\u2013177. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_13"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"3","key":"11_CR4","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014). https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"EURASIP J. Inf. Secur."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Guo, L., Ni, J., Shi, Y.Q.: An efficient JPEG steganographic scheme using uniform embedding. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 169\u2013174. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412644"},{"issue":"5","key":"11_CR7","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814\u2013825 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"11_CR8","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimed. 20(12), 3223\u20133238 (2018)","journal-title":"IEEE Trans. Multimed."},{"issue":"7","key":"11_CR9","doi-asserted-by":"publisher","first-page":"2779","DOI":"10.1109\/TCSVT.2020.3033945","volume":"31","author":"Y Luo","year":"2021","unstructured":"Luo, Y., Qin, J., Xiang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2779\u20132791 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TIP.2014.2371246","volume":"24","author":"K Wu","year":"2015","unstructured":"Wu, K., Wang, C.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130\u2013139 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","volume":"31","author":"J Xu","year":"2015","unstructured":"Xu, J., Mao, X., Jin, X., et al.: Hidden message in a deformation-based texture. Vis. Comput. 31, 1653\u20131669 (2015)","journal-title":"Vis. Comput."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","volume":"9","author":"X Chen","year":"2022","unstructured":"Chen, X., Zhang, Z., Qiu, A., Xia, Z., Xiong, N.N.: Novel coverless steganography method based on image selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 9(1), 219\u2013230 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"9","key":"11_CR13","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1109\/TCSVT.2022.3161419","volume":"32","author":"F Peng","year":"2022","unstructured":"Peng, F., Chen, G., Long, M.: A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9), 5817\u20135829 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"11_CR14","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G Xu","year":"2016","unstructured":"Xu, G., Wu, H.-Z., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708\u2013712 (2016)","journal-title":"IEEE Signal Process. Lett."},{"issue":"11","key":"11_CR15","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181\u20131193 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TIFS.2019.2936913","volume":"15","author":"R Zhang","year":"2020","unstructured":"Zhang, R., Zhu, F., Liu, J., Liu, G.: Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-Based steganalysis. IEEE Trans. Inf. Forensics Secur. 15, 1138\u20131150 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR18","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Proceedings of the Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"issue":"10","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"11_CR20","unstructured":"Yang, J.H., Liu, K., Kang, X.Q., et al.: Spatial image steganography based on generative adversarial network. arXiv: Multimedia, https:\/\/arxiv.org\/abs\/1804.07939v1 (2019)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Y.W., Zhang, W.M., Chen, K.J., Liu, J.Y., Liu, Y.J., Yu, N.H.: Adversarial examples against deep neural network based steganalysis. In: Proceedings of the 6th ACM Workshop Information Hiding Multimedia Security, pp. 67\u201372. ACM (2018)","DOI":"10.1145\/3206004.3206012"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/LSP.2019.2963180","volume":"27","author":"L Zhou","year":"2020","unstructured":"Zhou, L., Feng, G., Shen, L., Zhang, X.: On security enhancement of steganography via generative adversarial image. IEEE Signal Process. Lett. 27, 166\u2013170 (2020)","journal-title":"IEEE Signal Process. Lett."},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2014 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5"},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2022","unstructured":"Tan, J., Liao, X., Liu, J., Cao, Y., Jiang, H.: Channel attention image steganography with generative adversarial networks. IEEE Trans. Netw. Sci. Eng. 9(2), 888\u2013903 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"8","key":"11_CR26","doi-asserted-by":"publisher","first-page":"5110","DOI":"10.1109\/TCSVT.2022.3148406","volume":"32","author":"X Qin","year":"2022","unstructured":"Qin, X., Li, B., Tan, S., Tang, W., Huang, J.: Gradually enhanced adversarial perturbations on color pixel vectors for image steganography. IEEE Trans. Circuits Syst. Video Technol. 32(8), 5110\u20135123 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"4621","DOI":"10.1109\/TIFS.2021.3111748","volume":"16","author":"M Liu","year":"2021","unstructured":"Liu, M., Luo, W., Zheng, P., Huang, J.: A new adversarial embedding method for enhancing image steganography. IEEE Trans. Inf. Forensics Secur. 16, 4621\u20134634 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Qin, X., Tan, S., Tang, W., Li, B., Huang, J.: Image steganography based on iterative adversarial perturbations onto a synchronized-directions sub-image. In: 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2705\u20132709. IEEE (2021)","DOI":"10.1109\/ICASSP39728.2021.9414055"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00745"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:04:08Z","timestamp":1700471048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}