{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:26:23Z","timestamp":1757629583697,"version":"3.44.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032045454","type":"print"},{"value":"9783032045461","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-04546-1_34","type":"book-chapter","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T14:52:45Z","timestamp":1757515965000},"page":"414-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IHCP: Image Hiding Against Blind Compression Based on\u00a0Quality Prediction"],"prefix":"10.1007","author":[{"given":"Hao","family":"Cao","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yulin","family":"He","sequence":"additional","affiliation":[]},{"given":"Wanjie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2022","unstructured":"Guan, Z., et al.: DeepMIH: deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, R., Yu, J., Xu, Y., Li, W., Zhang, J.: Editguard: versatile image watermarking for tamper localization and copyright protection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11964\u201311974 (2024)","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Jiang, J., Zhang, K., Timofte, R.: Towards flexible blind JPEG artifacts removal. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4997\u20135006 (2021)","DOI":"10.1109\/ICCV48922.2021.00495"},{"key":"34_CR4","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, C., Karjauv, A., Benz, P., Kweon, I.S.: Towards robust deep hiding under non-differentiable distortions for practical blind watermarking. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 5158\u20135166 (2021)","DOI":"10.1145\/3474085.3475628"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Xu, Y., Mou, C., Hu, Y., Xie, J., Zhang, J.: Robust invertible image steganography. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7875\u20137884 (2022)","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Luo, Y., Zhou, T., Liu, F., Cai, Z.: IRWArt: levering watermarking performance for protecting high-quality artwork images. In: Proceedings of the ACM Web Conference 2023, pp. 2340\u20132348 (2023)","DOI":"10.1145\/3543507.3583489"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Lan, Y., Shang, F., Yang, J., Kang, X., Li, E.: Robust image steganography: hiding messages in frequency coefficients. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 14955\u201314963 (2023)","DOI":"10.1609\/aaai.v37i12.26746"},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"issue":"3","key":"34_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"34_CR12","unstructured":"Zhang, C., Benz, P., Karjauv, A., Sun, G., Kweon, I.S.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems, vol. 33, pp. 10223\u201310234 (2020)"},{"issue":"7","key":"34_CR13","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"34_CR14","unstructured":"Chen, H., Song, L., Qian, Z., Zhang, X., Ma, K.: Hiding images in deep probabilistic models. In: Advances in Neural Information Processing Systems, vol. 35, pp. 36776\u201336788 (2022)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10816\u201310825 (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Mou, C., Xu, Y., Song, J., Zhao, C., Ghanem, B., Zhang, J.: Large-capacity and flexible video steganography via invertible neural network. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 22606\u201322615 (2023)","DOI":"10.1109\/CVPR52729.2023.02165"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-030-01267-0_40","volume-title":"Computer Vision \u2013 ECCV 2018","author":"J Zhu","year":"2018","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11219, pp. 682\u2013697. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01267-0_40"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Jia, Z., Fang, H., Zhang, W.: MBRS: enhancing robustness of DNN-based watermarking by mini-batch of real and simulated JPEG compression. In: Proceedings of the 29th ACM International Conference on Multimedia, pp. 41\u201349 (2021)","DOI":"10.1145\/3474085.3475324"},{"key":"34_CR19","volume":"111","author":"G Li","year":"2023","unstructured":"Li, G., Feng, B., He, M., Weng, J., Wei, L.: High-capacity coverless image steganographic scheme based on image synthesis. Signal Process.: Image Commun. 111, 116894 (2023)","journal-title":"Signal Process.: Image Commun."},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Guo, M., Zhang, J., Zhu, Y., Xie, X.: A novel two-stage separable deep learning framework for practical blind watermarking. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1509\u20131517 (2019)","DOI":"10.1145\/3343031.3351025"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Ma, R., et al.: Towards blind watermarking: combining invertible and non-invertible mechanisms. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 1532\u20131542 (2022)","DOI":"10.1145\/3503161.3547950"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Fang, H., Qiu, Y., Chen, K., Zhang, J., Zhang, W., Chang, E.-C.: Flow-based robust watermarking with invertible noise layer for black-box distortions. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 5054\u20135061 (2023)","DOI":"10.1609\/aaai.v37i4.25633"},{"key":"34_CR23","unstructured":"Kishore, V., Chen, X., Wang, Y., Li, B., Weinberger, K.Q.: Fixed neural network steganography: train the images, not the network. In: International Conference on Learning Representations (2021)"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Agustsson, E., Timofte, R.: NTIRE 2017 challenge on single image super-resolution: dataset and study. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 126\u2013135 (2017)","DOI":"10.1109\/CVPRW.2017.150"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Timofte, R., Agustsson, E., Van\u00a0Gool, L., Yang, M.-H., Zhang, L.: NTIRE 2017 challenge on single image super-resolution: methods and results. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 114\u2013125 (2017)","DOI":"10.1109\/CVPRW.2017.150"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Cogranne, R., Giboulot, Q., Bas, P.: ALASKA# 2: challenging academic research on steganalysis with realistic images. In: 2020 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20135. IEEE (2020)","DOI":"10.1109\/WIFS49906.2020.9360896"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-04546-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T14:52:55Z","timestamp":1757515975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-04546-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"ISBN":["9783032045454","9783032045461"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-04546-1_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"11 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}