{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:41:04Z","timestamp":1763811664051,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615278"},{"type":"electronic","value":"9789819615285"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1528-5_3","type":"book-chapter","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:23:19Z","timestamp":1739553799000},"page":"36-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["High-Capacity Image Hiding via\u00a0Compressible Invertible Neural Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2054-9215","authenticated-orcid":false,"given":"Changguang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2532-045X","authenticated-orcid":false,"given":"Haoyi","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Qingru","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3888-8167","authenticated-orcid":false,"given":"Dongmei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fangwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","volume":"609","author":"PC Mandal","year":"2022","unstructured":"Mandal, P.C.: Digital image steganography: a literature survey. Inform. Sci. 609, 1451\u20131488 (2022)","journal-title":"Inform. Sci."},{"unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Defining security in steganographic systems. In: Security and Watermarking of Multimedia Contents IV, pp. 50\u201356 (2002)","key":"3_CR2"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1117\/1.1388610","volume":"10","author":"NF Johnson","year":"2001","unstructured":"Johnson, N.F.: Information hiding: steganography and watermarking-attacks and countermeasures. J. Elect. Imag. 10(3), 825 (2001)","journal-title":"J. Elect. Imag."},{"issue":"9","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.1049\/iet-ipr.2018.6428","volume":"14","author":"K Aghababaiyan","year":"2020","unstructured":"Aghababaiyan, K.: Novel distortion free and histogram based data hiding scheme. IET Image Proc. 14(9), 1716\u20131725 (2020)","journal-title":"IET Image Proc."},{"issue":"5","key":"3_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Sign. Proc. Let. 13(5), 285\u2013287 (2006)","journal-title":"IEEE Sign. Proc. Let."},{"doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239 (2012)","key":"3_CR6","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1\u201313 (2014). https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"EURASIP J. Inf. Secur."},{"unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. In: Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 2069\u20132079 (2017)","key":"3_CR8"},{"doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X.: HiNet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","key":"3_CR9","DOI":"10.1109\/ICCV48922.2021.00469"},{"doi-asserted-by":"crossref","unstructured":"Guo, H., Xue, J.: The analysis of watermarking capacity of packing model and bits replacement model. In: 2016 12th World Congress on Intelligent Control and Automation (WCICA), pp. 2603\u20132607 (2016)","key":"3_CR10","DOI":"10.1109\/WCICA.2016.7578439"},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X.: Reversible image steganography scheme based on a U-net structure. IEEE Access 7, 9314\u20139323 (2019)","journal-title":"IEEE Access"},{"key":"3_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2023.104035","volume":"98","author":"X Duan","year":"2023","unstructured":"Duan, X.: DUIANet: a double layer U-Net image hiding method based on improved inception module and attention mechanism. J. Vis. Comm. Image Rep. 98, 104035 (2023)","journal-title":"J. Vis. Comm. Image Rep."},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127314","volume":"576","author":"X Duan","year":"2024","unstructured":"Duan, X.: DHU-Net: high-capacity binary data hiding network based on improved U-Net. Neurocomputing 576(1), 127314 (2024)","journal-title":"Neurocomputing"},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1016\/j.procs.2023.01.091","volume":"218","author":"A Kumar","year":"2023","unstructured":"Kumar, A.: Encoder-Decoder architecture for image steganography using skip connections. Proc. Comp. Sci. 218(4), 1122\u20131131 (2023)","journal-title":"Proc. Comp. Sci."},{"key":"3_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123540","volume":"249","author":"Y Yao","year":"2024","unstructured":"Yao, Y.: High invisibility image steganography with wavelet transform and generative adversarial network. Exp. Syst. Appl. 249, 123540 (2024)","journal-title":"Exp. Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Bui, T., Agarwal, S.: RoSteALS: robust steganography using autoencoder latent space. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 933\u2013942 (2023)","key":"3_CR16","DOI":"10.1109\/CVPRW59228.2023.00100"},{"key":"3_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2023.117022","volume":"118","author":"L Zhang","year":"2023","unstructured":"Zhang, L.: Joint adjustment image steganography networks. Signal Process. Image Comm. 118, 117022 (2023)","journal-title":"Signal Process. Image Comm."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.neunet.2023.05.053","volume":"165","author":"Z Li","year":"2023","unstructured":"Li, Z.: Adversarial feature hybrid framework for steganography with shifted window local loss. Neur. Netw. 165, 358\u2013369 (2023)","journal-title":"Neur. Netw."},{"issue":"7","key":"3_CR19","doi-asserted-by":"publisher","first-page":"878","DOI":"10.3390\/e24070878","volume":"24","author":"Z Wang","year":"2022","unstructured":"Wang, Z.: Deep image steganography using Transformer and recursive permutation. Entropy 24(7), 878 (2022)","journal-title":"Entropy"},{"unstructured":"Dinh, L.: Nice: non-linear independent components estimation. arXiv preprint arXiv:1410.8516 (2014)","key":"3_CR20"},{"key":"3_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109822","volume":"144","author":"H Liu","year":"2023","unstructured":"Liu, H.: Unpaired image super-resolution using a lightweight invertible neural network. Pattern Recogn. 144, 109822 (2023)","journal-title":"Pattern Recogn."},{"unstructured":"Ardizzone, L.: Guided image generation with conditional invertible neural networks. arXiv preprint arXiv:1907.02392 (2019)","key":"3_CR22"},{"issue":"12","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.3390\/e24121762","volume":"24","author":"L Liu","year":"2022","unstructured":"Liu, L.: Lossless image steganography based on invertible neural networks. Entropy 24(12), 1762 (2022)","journal-title":"Entropy"},{"doi-asserted-by":"crossref","unstructured":"Feng, Y., Liu, Y.: Image hide with invertible network and Swin Transformer. In: International Conference on Data Mining and Big Data, pp. 385\u2013394 (2022)","key":"3_CR24","DOI":"10.1007\/978-981-19-8991-9_27"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.neunet.2023.03.037","volume":"163","author":"F Shang","year":"2023","unstructured":"Shang, F.: Robust data hiding for JPEG images with invertible neural network. Neur. Netw. 163, 219\u2013232 (2023)","journal-title":"Neur. Netw."},{"key":"3_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108419","volume":"133","author":"H Yang","year":"2024","unstructured":"Yang, H.: PRIS: practical robust invertible network for image steganography. Eng. Appl. Art. Intell. 133, 108419 (2024)","journal-title":"Eng. Appl. Art. Intell."},{"doi-asserted-by":"crossref","unstructured":"Ding, X., Guo, Y.: ACNet: strengthening the kernel skeletons for powerful CNN via asymmetric convolution blocks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1911\u20131920 (2019)","key":"3_CR27","DOI":"10.1109\/ICCV.2019.00200"},{"doi-asserted-by":"crossref","unstructured":"Ding, X., Guo, Y.: RepVGG: making VGG-style convnets great again. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13733\u201313742 (2021)","key":"3_CR28","DOI":"10.1109\/CVPR46437.2021.01352"},{"issue":"7","key":"3_CR29","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat, S.G.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Patt. Anal. Mach. Intell. 11(7), 674\u2013693 (1989)","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J.: CBAM: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3\u201319 (2018)","key":"3_CR30","DOI":"10.1007\/978-3-030-01234-2_1"},{"unstructured":"Van Den Oord, A., Vinyals, O.: Neural discrete representation learning. In: Proceedings of Advances in Neural Information Processing Systems (NIPS), p. 30 (2017)","key":"3_CR31"},{"issue":"3","key":"3_CR32","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inform. Foren. Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inform. Foren. Secur."},{"key":"3_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114540","volume":"170","author":"D Liu","year":"2021","unstructured":"Liu, D.: A fusion-domain color image watermarking based on Haar transform and image correction. Expert Syst. Appl. 170, 114540 (2021)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R.: Hidden: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","key":"3_CR34","DOI":"10.1007\/978-3-030-01267-0_40"},{"unstructured":"Boehm, B.: Stegexpose - a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014)","key":"3_CR35"},{"issue":"5","key":"3_CR36","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand, M.: Deep residual network for steganalysis of digital images. IEEE Trans. Inform. Foren. Secur. 14(5), 1181\u20131193 (2018)","journal-title":"IEEE Trans. Inform. Foren. Secur."},{"issue":"7","key":"3_CR37","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Patt. Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1528-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:29:11Z","timestamp":1750937351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1528-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615278","9789819615285"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1528-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}