{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:16:20Z","timestamp":1742987780787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031781247"},{"type":"electronic","value":"9783031781254"}],"license":[{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T00:00:00Z","timestamp":1733356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78125-4_3","type":"book-chapter","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T06:07:06Z","timestamp":1733292426000},"page":"33-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Coverless Steganography of\u00a0Face Privacy Protection with\u00a0Diffusion Models"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Ziqi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,5]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/B978-0-12-385510-7.00002-3","volume":"83","author":"GC Kessler","year":"2011","unstructured":"Kessler, G.C., Hosmer, C.: An overview of steganography. Adv. Comput. 83, 51\u2013107 (2011)","journal-title":"Adv. Comput."},{"doi-asserted-by":"crossref","unstructured":"Chanu, Y. J., Singh, K. M., Tuithung, T.: Image steganography and steganalysis: a survey. In: International Joint Conference on Artificial Intelligence (IJCAI) 52(2) (2012)","key":"3_CR2","DOI":"10.1109\/NCETACS.2012.6203297"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixel difference. In 2009 International Conference on computer engineering and technology, vol. 1, pp. 588\u2013592. IEEE (2009)","key":"3_CR4","DOI":"10.1109\/ICCET.2009.40"},{"unstructured":"Dinh, L., Krueger, D., Bengio, Y.: Nice: non-linear independent components estimation. arXiv preprint arXiv:1410.8516 (2014)","key":"3_CR5"},{"key":"3_CR6","first-page":"171372","volume":"7","author":"J Qin","year":"2019","unstructured":"Qin, J., Luo, Y., Xiang, X., Tan, Y., Huang, H.: Coverless image steganography: a survey 7, 171372\u2013171394 (2019)","journal-title":"Coverless image steganography: a survey"},{"doi-asserted-by":"crossref","unstructured":"Zhu, J.Y., Park, T., Isola, P., Efros, A.A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision, pp. 2223\u20132232 (2017)","key":"3_CR7","DOI":"10.1109\/ICCV.2017.244"},{"doi-asserted-by":"crossref","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Cloud Computing and Security: First International Conference, pp. 123\u2013132. Springer, China (2015)","key":"3_CR8","DOI":"10.1007\/978-3-319-27051-7_11"},{"doi-asserted-by":"crossref","unstructured":"Lugmayr, A., Danelljan, M., Romero, A., Yu, F., Timofte, R., Van Gool, L.: Repaint: inpainting using denoising diffusion probabilistic models. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11461\u201311471 (2022)","key":"3_CR9","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"3_CR10","first-page":"23593","volume":"35","author":"B Kawar","year":"2022","unstructured":"Kawar, B., Elad, M., Ermon, S., Song, J.: Denoising diffusion restoration models. Adv. Neural. Inf. Process. Syst. 35, 23593\u201323606 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"doi-asserted-by":"crossref","unstructured":"Mou, C., Wang, X., Xie, L., Wu, Y., Zhang, J., Qi, Z., Shan, Y.: T2i-adapter: learning adapters to dig out more controllable ability for text-to-image diffusion models. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 38, No. 5, pp. 4296\u20134304, March 2024","key":"3_CR11","DOI":"10.1609\/aaai.v38i5.28226"},{"unstructured":"Hertz, A., Mokady, R., Tenenbaum, J., Aberman, K., Pritch, Y., Cohen-Or, D.: Prompt-to-prompt image editing with cross attention control. https:\/\/arxiv.org\/abs\/2208.01626 (2022)","key":"3_CR12"},{"unstructured":"Li, J., Li, D., Xiong, C., Hoi, S.: Blip: bootstrapping language-image pre-training for unified vision-language understanding and generation. In International Conference on Machine Learning, pp. 12888\u201312900. PMLR (2022)","key":"3_CR13"},{"unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)","key":"3_CR14"},{"doi-asserted-by":"crossref","unstructured":"Pan, F., Li, J., Yang, X.: Image steganography method based on PVD and modulus function. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 282\u2013284. IEEE (2011)","key":"3_CR15","DOI":"10.1109\/ICECC.2011.6067590"},{"doi-asserted-by":"crossref","unstructured":"McKeon, R.T.: Strange Fourier steganography in movies. In: 2007 IEEE International Conference on Electro\/Information Technology, pp. 178-182. IEEE (2007)","key":"3_CR16","DOI":"10.1109\/EIT.2007.4374540"},{"issue":"5","key":"3_CR17","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/41.954550","volume":"48","author":"MS Hsieh","year":"2001","unstructured":"Hsieh, M.S., Tseng, D.C., Huang, Y.H.: Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Industr. Electron. 48(5), 875\u2013882 (2001)","journal-title":"IEEE Trans. Industr. Electron."},{"doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: Hiding data with deep networks. In: Proceedings of the European conference on computer vision (ECCV), pp. 657\u2013672 (2018)","key":"3_CR18","DOI":"10.1007\/978-3-030-01267-0_40"},{"unstructured":"Zhang, K.A., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: SteganoGAN: high capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019)","key":"3_CR19"},{"unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Advances in neural information processing systems, 30 (2017)","key":"3_CR20"},{"doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J.,Guan, Z.: Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","key":"3_CR21","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"3_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108419","volume":"133","author":"H Yang","year":"2024","unstructured":"Yang, H., Xu, Y., Liu, X., Ma, X.: PRIS: practical robust invertible network for image steganography. Eng. Appl. Artif. Intell. 133, 108419 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"13","key":"3_CR23","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft. Comput. 23(13), 4927\u20134938 (2019)","journal-title":"Soft. Comput."},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1504\/IJHPCN.2019.102133","volume":"14","author":"Y Mu","year":"2019","unstructured":"Mu, Y., Zhou, Z.: Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography. Int. J. High Perform. Comput. Networking 14(3), 333\u2013341 (2019)","journal-title":"Int. J. High Perform. Comput. Networking"},{"key":"3_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105375","volume":"192","author":"Q Liu","year":"2020","unstructured":"Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., Luo, Y.: Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowl.-Based Syst. 192, 105375 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"1","key":"3_CR26","first-page":"29","volume":"6","author":"J Lu","year":"2021","unstructured":"Lu, J., Ni, J., Li, L., Luo, T., Chang, C.: A coverless information hiding method based on constructing a complete grouped basis with unsupervised learning 6(1), 29\u201339 (2021)","journal-title":"A coverless information hiding method based on constructing a complete grouped basis with unsupervised learning"},{"issue":"1","key":"3_CR27","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1186\/s13638-022-02107-5","volume":"2022","author":"YH Li","year":"2022","unstructured":"Li, Y.H., Chang, C.C., Su, G.D., Yang, K.L., Aslam, M.S., Liu, Y.: Coverless image steganography using morphed face recognition based on convolutional neural network. EURASIP J. Wirel. Commun. Netw. 2022(1), 28 (2022)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"unstructured":"Yu, J., Zhang, X., Xu, Y., Zhang, J.: Cross: diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems 36 (2024)","key":"3_CR28"},{"unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256-2265. PMLR (2015)","key":"3_CR29"},{"doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","key":"3_CR30","DOI":"10.1109\/CVPR52688.2022.01042"},{"doi-asserted-by":"crossref","unstructured":"Avrahami, O., Lischinski, D., Fried, O.: Blended diffusion for text-driven editing of natural images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 18208\u201318218 (2022)","key":"3_CR31","DOI":"10.1109\/CVPR52688.2022.01767"},{"unstructured":"Gal, R., et al.: An image is worth one word: Personalizing text-to-image generation using textual inversion. arXiv preprint arXiv:2208.01618 (2022)","key":"3_CR32"},{"doi-asserted-by":"crossref","unstructured":"Ruiz, N., Li, Y., Jampani, V., Pritch, Y., Rubinstein, M., Aberman, K.: Dreambooth: fine tuning text-to-image diffusion models for subject-driven generation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 22500\u201322510 (2023)","key":"3_CR33","DOI":"10.1109\/CVPR52729.2023.02155"},{"issue":"9","key":"3_CR34","doi-asserted-by":"publisher","first-page":"3135","DOI":"10.3390\/app10093135","volume":"10","author":"L Luo","year":"2020","unstructured":"Luo, L., Xue, D., Feng, X.: Ehanet: an effective hierarchical aggregation network for face parsing. Appl. Sci. 10(9), 3135 (2020)","journal-title":"Appl. Sci."},{"unstructured":"Stegexpose: a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014)","key":"3_CR35"},{"unstructured":"Corley, I., Lwowski, J., Hoffman, J.: Destruction of image steganography using generative adversarial networks. arXiv preprint arXiv:1912.10070 (2019)","key":"3_CR36"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78125-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T07:03:22Z","timestamp":1733295802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78125-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,5]]},"ISBN":["9783031781247","9783031781254"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78125-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,5]]},"assertion":[{"value":"5 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}