{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:17:25Z","timestamp":1742977045765,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819784899"},{"type":"electronic","value":"9789819784905"}],"license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8490-5_12","type":"book-chapter","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:09:07Z","timestamp":1730884147000},"page":"160-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generative Steganography Based on\u00a0Dual-Branch Flow"],"prefix":"10.1007","author":[{"given":"Ke","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Bingbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Yunyun","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"12_CR1","unstructured":"Adams, R.P.: High-dimensional probability estimation with deep density models (2013). arxiv:1302.5125"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Altaay, A.A.J., Sahib, S.B., Zamani, M.: An introduction to image steganography techniques. In: 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 122\u2013126. IEEE (2012)","DOI":"10.1109\/ACSAT.2012.25"},{"key":"12_CR3","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"7","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181\u20131193 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"key":"12_CR7","unstructured":"Chu, C., Zhmoginov, A., Sandler, M.: Cyclegan, a master of steganography (2017). arXiv:1712.02950"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"12_CR9","unstructured":"Denis, V., Ivan, N., Evgeny, B.: Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision, vol. 11433, p. 114333M (2020)"},{"key":"12_CR10","unstructured":"Dinh, L., Krueger, D., Bengio, Y.: Nice: non-linear independent components estimation (2014). arXiv:1410.8516"},{"key":"12_CR11","unstructured":"Dinh, L., Sohl-Dickstein, J., Bengio, S.: Density estimation using real nvp (2016). arXiv:1605.08803"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., Qin, C.: Reversible image steganography scheme based on a u-net structure. IEEE Access 7, 9314\u20139323 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2022","unstructured":"Guan, Z., Jing, J., Deng, X., Xu, M., Jiang, L., Zhang, Z., Li, Y.: Deepmih: deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"12_CR15","unstructured":"Kingma, D.P., Dhariwal, P.: Glow: Generative flow with invertible 1x1 convolutions. Adv. Neural Inf. Process. Syst. 31 (2018)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Li, G., Feng, B., He, M., Weng, J., Lu, W.: High-capacity coverless image steganographic scheme based on image synthesis. Signal Process. Image Commun. 111, 116894 (2023)","DOI":"10.1016\/j.image.2022.116894"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-020-00521-7","volume":"2020","author":"Q Liu","year":"2020","unstructured":"Liu, Q., Xiang, X., Qin, J., Tan, Y., Qiu, Y.: Coverless image steganography based on densenet feature mapping. EURASIP J. Image Video Process. 2020, 1\u201318 (2020)","journal-title":"EURASIP J. Image Video Process."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Liu, X., Ma, Z., Ma, J., Zhang, J., Schaefer, G., Fang, H.: Image disentanglement autoencoder for steganography without embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2303\u20132312 (2022)","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730\u20133738 (2015)","DOI":"10.1109\/ICCV.2015.425"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Lu, S.P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10816\u201310825 (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Ouyang, H., Wang, T., Chen, Q.: Restorable image operators with quasi-invertible networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 2008\u20132016 (2022)","DOI":"10.1609\/aaai.v36i2.20096"},{"issue":"9","key":"12_CR22","doi-asserted-by":"publisher","first-page":"5817","DOI":"10.1109\/TCSVT.2022.3161419","volume":"32","author":"F Peng","year":"2022","unstructured":"Peng, F., Chen, G., Long, M.: A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9), 5817\u20135829 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"12_CR23","unstructured":"Song, B., Wang, D., Zhang, T., Liu, R., Lin, Y., Zhou, W.: Double-flow-based steganography without embedding for image-to-image hiding (2023). arXiv:2311.15027"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Van\u00a0Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. In: Proceedings of 1st International Conference on Image Processing, vol.\u00a02, pp. 86\u201390. IEEE (1994)","DOI":"10.1109\/ICIP.1994.413536"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Xu, Y., Mou, C., Hu, Y., Xie, J., Zhang, J.: Robust invertible image steganography. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7875\u20137884 (2022)","DOI":"10.1109\/CVPR52688.2022.00772"},{"issue":"11","key":"12_CR26","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR27","unstructured":"Yu, J., Zhang, X., Xu, Y., Zhang, J.: Cross: Diffusion model makes controllable, robust and secure image steganography (2023). arXiv:2305.16936"},{"key":"12_CR28","unstructured":"Zhang, S., Su, S., Li, L., Lu, J., Zhou, Q., Chang, C.C.: Csst-net: an arbitrary image style transfer network of coverless steganography. The Visual Computer, pp. 1\u201313 (2022)"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8490-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T09:12:57Z","timestamp":1730884377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8490-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"ISBN":["9789819784899","9789819784905"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8490-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"7 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}