{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:14:17Z","timestamp":1743009257214,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819786916"},{"type":"electronic","value":"9789819786923"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8692-3_23","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T14:03:04Z","timestamp":1730383384000},"page":"319-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Anti-rounding Image Steganography Method for\u00a0Improved UNet++"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8757-2447","authenticated-orcid":false,"given":"Xintao","family":"Duan","sequence":"first","affiliation":[]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Luwei","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Kaiou","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Mengru","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Yinhang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31(2), 26\u201334 (1998)","journal-title":"Computer"},{"key":"23_CR2","unstructured":"Katzenbeisser, S., Petitcolas, F.A.: Defining security in steganographic systems. In: Security and Watermarking of Multimedia Contents IV, vol.\u00a04675, pp. 50\u201356. SPIE (2002)"},{"key":"23_CR3","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"7","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"195253","DOI":"10.1109\/ACCESS.2020.3033895","volume":"8","author":"X Duan","year":"2020","unstructured":"Duan, X., Wang, W., Liu, N., Yue, D., Xie, Z., Qin, C.: Stegopnet: image steganography with generalization ability based on pyramid pooling module. IEEE Access 8, 195253\u2013195262 (2020)","journal-title":"IEEE Access"},{"key":"23_CR6","first-page":"10223","volume":"33","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Benz, P., Karjauv, A., Sun, G., Kweon, I.S.: Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Adv. Neural. Inf. Process. Syst. 33, 10223\u201310234 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Yin, X., Wu, S., Wang, K., Lu, W., Zhou, Y., Huang, J.: Anti-rounding image steganography with separable fine-tuned network. IEEE Trans. Circuits Syst. Video Technol. (2023)","DOI":"10.1109\/TCSVT.2023.3269468"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 27\u201330 (2001)","DOI":"10.1145\/1232454.1232466"},{"key":"23_CR10","volume":"70","author":"AG Chefranov","year":"2022","unstructured":"Chefranov, A.G., \u00d6z, G.: Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images. J. Inf. Secur. Appl. 70, 103314 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1\u201313 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"10","key":"23_CR12","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TCSVT.2016.2587388","volume":"27","author":"W Zhang","year":"2016","unstructured":"Zhang, W., Zhang, Z., Zhang, L., Li, H., Yu, N.: Decomposing joint distortion for adaptive steganography. IEEE Trans. Circuits Syst. Video Technol. 27(10), 2274\u20132280 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"23_CR13","doi-asserted-by":"publisher","first-page":"3545","DOI":"10.1109\/TCSVT.2018.2865537","volume":"28","author":"W Su","year":"2018","unstructured":"Su, W., Ni, J., Li, X., Shi, Y.Q.: A new distortion function design for jpeg steganography using the generalized uniform embedding strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12), 3545\u20133549 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"23_CR14","first-page":"275","volume":"4","author":"PY Po-Yueh","year":"2006","unstructured":"Po-Yueh, P.Y., Lin, H.J., et al.: A dwt based approach for image steganography. Int. J. Appl. Sci. Eng. 4(3), 275\u2013290 (2006)","journal-title":"Int. J. Appl. Sci. Eng."},{"issue":"1","key":"23_CR15","first-page":"4","volume":"10","author":"E Walia","year":"2010","unstructured":"Walia, E., Jain, P., Navdeep, N.: An analysis of LSB & DCT based steganography. Global J. Comp. Sci. Technol. 10(1), 4\u20138 (2010)","journal-title":"Global J. Comp. Sci. Technol."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Y., Moulin, P.: Statistical modeling and steganalysis of DFT-based image steganography. In: Security, Steganography, and Watermarking of Multimedia Contents VIII, vol.\u00a06072, pp. 14\u201324. SPIE (2006)","DOI":"10.1117\/12.642357"},{"issue":"27","key":"23_CR17","doi-asserted-by":"publisher","first-page":"39803","DOI":"10.1007\/s11042-022-13206-2","volume":"81","author":"L Liu","year":"2022","unstructured":"Liu, L., Meng, L., Wang, X., Peng, Y.: An image steganography scheme based on resnet. Multimed. Tools Appl. 81(27), 39803\u201339820 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"23_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.108170","volume":"115","author":"X Zhu","year":"2022","unstructured":"Zhu, X., Lai, Z., Liang, Y., Xiong, J., Wu, J.: Generative high-capacity image hiding based on residual CNN in wavelet domain. Appl. Soft Comput. 115, 108170 (2022)","journal-title":"Appl. Soft Comput."},{"issue":"11","key":"23_CR19","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"23_CR20","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"2","key":"23_CR21","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2021","unstructured":"Tan, J., Liao, X., Liu, J., Cao, Y., Jiang, H.: Channel attention image steganography with generative adversarial networks. IEEE Trans. Netw. Sci. Eng. 9(2), 888\u2013903 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255. Ieee (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"23_CR23","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Large-scale celebfaces attributes (celeba) dataset. Retrieved August 15(2018) (Nov 2018)"},{"key":"23_CR24","doi-asserted-by":"publisher","unstructured":"Lin, T.Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) Computer Vision \u2013 ECCV 2014. ECCV 2014. Lecture Notes in Computer Science, vol. 8693. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Nilsback, M.E., Zisserman, A.: Automated flower classification over a large number of classes. In: 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing, pp. 722\u2013729. IEEE (2008)","DOI":"10.1109\/ICVGIP.2008.47"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition, pp. 2366\u20132369. IEEE (2010)","DOI":"10.1109\/ICPR.2010.579"},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Johnson, J., Alahi, A., Fei-Fei, L.: Perceptual losses for real-time style transfer and super-resolution. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision \u2013 ECCV 2016. ECCV 2016. Lecture Notes in Computer Science, vol. 9906. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46475-6_43","DOI":"10.1007\/978-3-319-46475-6_43"},{"issue":"5","key":"23_CR28","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181\u20131193 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8692-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T14:26:24Z","timestamp":1730384784000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8692-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9789819786916","9789819786923"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8692-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}