{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:10:45Z","timestamp":1743034245691,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819611478"},{"type":"electronic","value":"9789819611485"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1148-5_14","type":"book-chapter","created":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:16Z","timestamp":1737121516000},"page":"167-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generative Image Steganography Based on\u00a0Latent Space Vector Coding and\u00a0Diffusion Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1755-0936","authenticated-orcid":false,"given":"Weisong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiewen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5641-7169","authenticated-orcid":false,"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,18]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Information Hiding","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: B\u00f6hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161\u2013177. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_13"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234-239. IEEE (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123\u2013132. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_11"},{"issue":"1","key":"14_CR4","first-page":"130","volume":"24","author":"KC Wu","year":"2014","unstructured":"Wu, K.C., Wang, C.M.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130\u2013139 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"14_CR5","doi-asserted-by":"publisher","first-page":"4118","DOI":"10.1109\/TDSC.2022.3217661","volume":"20","author":"Z Zhou","year":"2022","unstructured":"Zhou, Z., Su, Y., Li, J., et al.: Secret-to-image reversible transformation for generative steganography. IEEE Trans. Dependable Secure Comput. 20(5), 4118\u20134134 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"14_CR6","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., et al.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/TIFS.2019.2922229","volume":"15","author":"J Yang","year":"2019","unstructured":"Yang, J., Ruan, D., Huang, J., et al.: An embedding cost learning framework using GAN. IEEE Trans. Inf. Forensics Secur. 15, 839\u2013851 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2022","unstructured":"Guan, Z., Jing, J., Deng, X., et al.: DeepMIH: deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Liu, X., Ma, Z., Ma, J., et al.: Image disentanglement autoencoder for steganography without embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2303-2312 (2022)","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"14_CR12","unstructured":"Kingma, D.P., Dhariwal, P.: Glow: generative flow with invertible 1x1 convolutions. Adv. Neural Inform. Process. Syst. 31 (2018)"},{"key":"14_CR13","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"14_CR14","unstructured":"Karami, M., Schuurmans, D., Sohl-Dickstein, J., et al.: Invertible convolutional flow. Adv. Neural Inform. Process. Syst. 32 (2019)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1148-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T13:45:21Z","timestamp":1737121521000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1148-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819611478","9789819611485"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1148-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIS&P","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ais&p2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}