{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:57:08Z","timestamp":1774605428412,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["1132221E182064"],"award-info":[{"award-number":["1132221E182064"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["1142221E182061"],"award-info":[{"award-number":["1142221E182061"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00034-025-03248-w","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T10:25:18Z","timestamp":1757413518000},"page":"1934-1957","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ConcealNet: A Deep Learning Framework for Image Encryption and High-Capacity Data Embedding Using Denoising Diffusion Implicit Models"],"prefix":"10.1007","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9932-0594","authenticated-orcid":false,"given":"Yi-Hui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Meng-Yu","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"issue":"7","key":"3248_CR1","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2020","unstructured":"S. Baluja, Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3248_CR2","doi-asserted-by":"crossref","unstructured":"X.L. Bi, X.Y. Yang, C. Wang, J. Liu, High-capacity image steganography algorithm based on image style transfer. Security and Communication Networks 2021, 1\u201314 (2021)","DOI":"10.1155\/2021\/4179340"},{"issue":"1","key":"3248_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","volume":"9","author":"XY Chen","year":"2022","unstructured":"X.Y. Chen, Z.T. Zhang, A. Qiu, Z.H. Xia, N.N. Xiong, Novel coverless steganography method based on image selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 9(1), 219\u2013230 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"7253","key":"3248_CR4","first-page":"1","volume":"20","author":"XT Duan","year":"2020","unstructured":"X.T. Duan, M.X. Gou, N. Liu, W.X. Wang, C. Qin, High capacity image steganography based on improved Xception. Sensors. 20(7253), 1\u201316 (2020)","journal-title":"Sensors"},{"issue":"2","key":"3248_CR5","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1109\/TCC.2022.3155744","volume":"11","author":"GY Gao","year":"2023","unstructured":"G.Y. Gao, S.K. Tong, Z.H. Xia, Y.Q. Shi, A universal reversible data hiding method in encrypted image based on MSB prediction and error embedding. IEEE Trans. Cloud Comput. 11(2), 1692\u20131706 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"3248_CR6","doi-asserted-by":"publisher","first-page":"103481","DOI":"10.1016\/j.jvcir.2022.103481","volume":"84","author":"K Gao","year":"2022","unstructured":"K. Gao, J.H. Horng, C.C. Chang, High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J. Vis. Commun. Image Represent. 84, 103481 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"8","key":"3248_CR7","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1109\/TCSVT.2018.2863029","volume":"29","author":"HL Ge","year":"2019","unstructured":"H.L. Ge, Y. Chen, Z.X. Qian, J.J. Wang, A high capacity multi-level approach for reversible data hiding in encrypted images. IEEE Trans. Circuits Syst. Video Technol. 29(8), 2285\u20132295 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"3248_CR8","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"ZY Guan","year":"2023","unstructured":"Z.Y. Guan, J.P. Jing, X. Deng, M. Xu, J. Lai, Z. Zhou, Y.P. Li, DeepMIH: deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3248_CR9","unstructured":"J. Ho, A. Jain, P. Abbeel, Denoising diffusion probabilistic models. arXiv preprint arXiv:2006.11239 (2020)"},{"key":"3248_CR10","doi-asserted-by":"crossref","unstructured":"J.P. Jing, X. Deng, M. Xu, J.Y. Wang, Z.Y. Guan, HiNet: Deep image hiding by invertible network, in Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV). 2021, pp. 4733\u20134742","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"3248_CR11","unstructured":"R. Johnson, T. Zhang, Accelerating stochastic gradient descent using predictive variance reduction. Adv. Neural. Inf. Process. Syst. 26 (2013)"},{"key":"3248_CR12","unstructured":"D.P. Kingma, J. Ba, Adam: a method for stochastic optimization. ArXiv Preprint arXiv:1412.6980 (2014)"},{"issue":"8","key":"3248_CR13","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"A. Mohammadi, M. Nakhkash, M.A. Akhaee, A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2366\u20132376 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3248_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.image.2016.03.010","volume":"44","author":"TS Nguyen","year":"2016","unstructured":"T.S. Nguyen, C.C. Chang, W.C. Chang, High capacity reversible data hiding scheme for encrypted images. Sig. Process. Image Commun. 44, 84\u201391 (2016)","journal-title":"Sig. Process. Image Commun."},{"key":"3248_CR15","unstructured":"A. Nichol, P. Dhariwal, A. Ramesh, P. Shyam, P. Mishkin, B. McGrew, I. Sutskever, M. Chen, Glide: Towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021)"},{"key":"3248_CR16","doi-asserted-by":"crossref","unstructured":"M.E. Nilsback, A. Zisserman, Automated flower classification over a large number of classes, in 2008 Sixth Indian conference on computer vision, graphics & image processing. 2008, pp. 722\u2013729","DOI":"10.1109\/ICVGIP.2008.47"},{"issue":"11","key":"3248_CR17","doi-asserted-by":"publisher","first-page":"7871","DOI":"10.1109\/TPAMI.2021.3114555","volume":"44","author":"WW Pan","year":"2021","unstructured":"W.W. Pan, Y.L. Yin, X.C. Wang, Y.C. Jing, M.L. Song, Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(11), 7871\u20137884 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"3248_CR18","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"ZX Qian","year":"2016","unstructured":"Z.X. Qian, X.P. Zhang, Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636\u2013646 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3248_CR19","first-page":"2924","volume":"24","author":"LF Qu","year":"2021","unstructured":"L.F. Qu, F. Chen, S.J. Zhang, H.J. He, Cryptanalysis of reversible data hiding in encrypted images by block permutation and comodulation. IEEE Trans. Multimedia. 24, 2924\u20132937 (2021)","journal-title":"IEEE Trans. Multimedia"},{"key":"3248_CR20","unstructured":"A. Ramesh, P. Dhariwal, A. Nichol, C. Chu, M. Chen, Hierarchical text-conditional image generation with clip latents. ArXiv Preprint arXiv:2204.06125 1.2 (2022), p. 3"},{"key":"3248_CR21","doi-asserted-by":"crossref","unstructured":"R. Rombach, A. Blattmann, D. Lorenz, P. Esser, B. Ommer, High-resolution image synthesis with latent diffusion models, in  Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2022, pp. 10684\u201310695","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"3248_CR22","first-page":"36479","volume":"35","author":"C Saharia","year":"2022","unstructured":"C. Saharia, W. Chan, S. Saxena, L. Li, J. Whang, E.L. Denton, K. Ghasemipour, R.G. Lopes, B.K. Ayan, T. Salimans, Photorealistic text-to-image diffusion models with deep Language Understanding. Adv. Neural. Inf. Process. Syst. 35, 36479\u201336494 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3248_CR23","unstructured":"J.M. Song, C.L. Meng, S.F. Ermon, Denoising diffusion implicit models. International Conference on Learning Representations (ICLR). 2021"},{"issue":"8","key":"3248_CR24","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"YQ Wu","year":"2020","unstructured":"Y.Q. Wu, Y.Z. Xiang, Y.T. Guo, J. Tang, Z.X. Yin, An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia. 22(8), 1929\u20131938 (2020)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"3248_CR25","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","volume":"21","author":"S Yi","year":"2019","unstructured":"S. Yi, Y. Zhou, Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia. 21(1), 51\u201364 (2019)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"3248_CR26","first-page":"992","volume":"19","author":"ZX Yin","year":"2022","unstructured":"Z.X. Yin, Y.Y. Peng, Y.Z. Xiang, Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans. Dependable Secur. Comput. 19(2), 992\u20131002 (2022)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"4","key":"3248_CR27","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"ZX Yin","year":"2020","unstructured":"Z.X. Yin, Y.Z. Xiang, X.P. Zhang, Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimedia. 22(4), 874\u2013884 (2020)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"3248_CR28","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCSVT.2021.3062947","volume":"32","author":"CQ Yu","year":"2022","unstructured":"C.Q. Yu, X.Q. Zhang, X.P. Zhang, G.X. Li, Z.J. Tang, Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans. Circuits Syst. Video Technol. 32(2), 451\u2013466 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"3248_CR29","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","volume":"18","author":"WM Zhang","year":"2016","unstructured":"W.M. Zhang, H. Wang, D.D. Hou, N.H. Yu, Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia. 18(8), 1469\u20131479 (2016)","journal-title":"IEEE Trans. Multimedia"},{"issue":"4","key":"3248_CR30","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"X.P. Zhang, Reversible data hiding in encrypted image. IEEE. Signal. Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE. Signal. Process. Lett."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03248-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03248-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03248-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:13:58Z","timestamp":1774602838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03248-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["3248"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03248-w","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"31 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare that they have no conflict of interest\/Competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}