{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:46:01Z","timestamp":1750938361306,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811989902"},{"type":"electronic","value":"9789811989919"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8991-9_27","type":"book-chapter","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T08:04:02Z","timestamp":1674029042000},"page":"385-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Image Hide with Invertible Network and Swin Transformer"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9470-5671","authenticated-orcid":false,"given":"Yuhuan","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4506-6065","authenticated-orcid":false,"given":"Yunjie","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6952-0464","authenticated-orcid":false,"given":"Hongjuan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7877-1030","authenticated-orcid":false,"given":"Jin","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0799-5744","authenticated-orcid":false,"given":"Rujia","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7598-2462","authenticated-orcid":false,"given":"Chunpeng","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Processing. 90(3), 727\u2013752 (2010)","DOI":"10.1016\/j.sigpro.2009.08.010"},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 234\u2013241. Springer (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"27_CR4","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Adv. Neural Inf. Process Syst. 30 (2017)"},{"key":"27_CR5","unstructured":"Rahim, R., Nadeem, S.: End-to-end trained CNN encoder-decoder networks for image steganography. In: Proceedings of the European Conference on Computer Vision (ECCV) Workshops, pp. 0\u20130 (2018)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Wu, P., Yang, Y., Li, X.: Stegnet: mega image steganography capacity with deep convolutional network. Future Internet. 10(6), 54 (2018)","DOI":"10.3390\/fi10060054"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., Qin, C.: Reversible image steganography scheme based on a U-Net structure. IEEE Access 7, 9314\u20139323 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"27_CR8","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2018","unstructured":"Zhang, R., Dong, S., Liu, J.: Invisible steganography via generative adversarial networks. Multimed. Tools Appl. 78(7), 8559\u20138575 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6951-z","journal-title":"Multimed. Tools Appl."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Chanu, Y.J., Singh, K.M., Tuithung, T.: Image steganography and steganalysis: a survey. Int. J. Comput. Appl. 52(2), 1\u201311 (2012)","DOI":"10.5120\/8171-1484"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299\u2013326 (2019)","journal-title":"Neurocomputing"},{"issue":"3","key":"27_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Cogranne, R., Zitzmann, C., Fillatre, L., Retraint, F., Nikiforov, I., Cornu, P.: A cover image model for reliable steganalysis. In: International Workshop on Information Hiding, pp. 178\u2013192. Springer (2011)","DOI":"10.1007\/978-3-642-24178-9_13"},{"issue":"4","key":"27_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22\u201328 (2001)","journal-title":"IEEE Multimedia"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Hawi, T.A., Qutayri, M., Barada, H.: Steganalysis attacks on stego-images using stego-signatures and statistical image properties. In: 2004 IEEE Region 10 Conference TENCON 2004, pp. 104\u2013107. IEEE (2004)","DOI":"10.1109\/TENCON.2004.1414542"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Ruanaidh, J., Dowling, W., Boland, F.M.: Phase watermarking of digital images. In: Proceedings of 3rd IEEE International Conference on Image Processing, pp. 239\u2013242. IEEE (1996)","DOI":"10.1109\/ICIP.1996.560428"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"C-T Hsu","year":"1999","unstructured":"Hsu, C.-T., Wu, J.-L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58\u201368 (1999)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"27_CR17","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783\u2013791 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"27_CR19","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. Adv. Neural Inform. Process. Syst. 30 (2017)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"27_CR21","unstructured":"Dinh, L., Krueger, D., Bengio, Y.: Nice: non-linear independent components estimation. arXiv preprint arXiv:1410.8516 (2014)"},{"key":"27_CR22","unstructured":"Dinh, L., Sohl-Dickstein, J., Bengio, S.: Density estimation using real nvp. arXiv preprint arXiv:1605.08803 (2016)"},{"key":"27_CR23","unstructured":"Kingma, D.P., Dhariwal, P.: Glow: generative flow with invertible 1x1 convolutions. Adv. Neural Inform. Process. Syst. 31 (2018)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Gilbert, A.C., Zhang, Y., Lee, K., Zhang, Y., Lee, H.: Towards understanding the invertibility of convolutional neural networks. arXiv preprint arXiv:1705.08664 (2017)","DOI":"10.24963\/ijcai.2017\/236"},{"key":"27_CR25","unstructured":"Song, Y., Meng, C., Ermon, S.: Mintnet: building invertible neural networks with masked convolutions. Adv. Neural Inform. Process. Syst. 32 (2019)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Doll\u00e1r, P., Girshick, R., He, K., Hariharan, B., Belongie, S.: Feature pyramid networks for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132125 (2017)","DOI":"10.1109\/CVPR.2017.106"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Singh, B., Davis, L.S.: An analysis of scale invariance in object detection snip. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3578\u20133587 (2018)","DOI":"10.1109\/CVPR.2018.00377"},{"key":"27_CR29","unstructured":"Singh, B., Najibi, M., Davis, L.S.: Sniper: efficient multi-scale training. Adv. Neural Inform. Process. Syst. 31 (2018)"},{"key":"27_CR30","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inform. Process. Syst. 30 (2017)"},{"key":"27_CR31","unstructured":"Dosovitskiy, A., et al: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Weng, X., Li, Y., Chi, L., Mu, Y.: High-capacity convolutional video steganography with temporal residual modeling. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, pp. 87\u201395 (2019)","DOI":"10.1145\/3323873.3325011"},{"key":"27_CR34","doi-asserted-by":"crossref","unstructured":"Agustsson, E., Timofte, R.: Ntire 2017 challenge on single image super-resolution: dataset and study. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 126\u2013135 (2017)","DOI":"10.1109\/CVPRW.2017.150"},{"issue":"4","key":"27_CR35","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"27_CR36","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Communications in Computer and Information Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8991-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T11:43:20Z","timestamp":1728733400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8991-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811989902","9789811989919"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8991-9_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"135","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}