{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:20:00Z","timestamp":1772911200564,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s00371-023-03214-0","type":"journal-article","created":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T11:04:31Z","timestamp":1707217471000},"page":"7887-7903","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A deep learning-based steganography method for high dynamic range images"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3563-6469","authenticated-orcid":false,"given":"Yongqing","family":"Huo","sequence":"first","affiliation":[]},{"given":"Yan","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Yaohui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"key":"3214_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press (2009)","DOI":"10.1017\/CBO9781139192903"},{"key":"3214_CR2","unstructured":"JSteg [CP]. http:\/\/zooid.org\/paul\/crypto\/jsteg\/2009-8-5"},{"key":"3214_CR3","first-page":"0501","volume":"II","author":"T Filler","year":"2010","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis coded quantization. Proc. SPIE, Media Forens. Secur. II, 0501\u20130514 (2010)","journal-title":"Proc. SPIE, Media Forens. Secur."},{"key":"3214_CR4","doi-asserted-by":"crossref","unstructured":"Pevny, T, Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding. Springer, Berlin, Heidelberg, pp. 161\u2013177 (2010)","DOI":"10.1007\/978-3-642-16435-4_13"},{"issue":"1","key":"3214_CR5","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1080\/02564602.2020.1808097","volume":"38","author":"X Duan","year":"2021","unstructured":"Duan, X., Li, B., Xie, Z., Yue, D., Ma, Y.: High-capacity information hiding based on residual network. Tech. Rev. IETE 38(1), 172\u2013183 (2021). (Web)","journal-title":"Tech. Rev. IETE"},{"key":"3214_CR6","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/tifs.2019.2922229","volume":"15","author":"JH Yang","year":"2020","unstructured":"Yang, J.H., Ruan, D.Y., Huang, J.W., Kang, X.G., Shi, Y.Q.: An embedding cost learning framework using GAN. IEEE Trans. Inf. Forens. Secur. 15, 839\u2013851 (2020). https:\/\/doi.org\/10.1109\/tifs.2019.2922229","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"7","key":"3214_CR7","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Dong, S.Q., Liu, J.Y.: Invisible steganography via generative adversarial networks. Multimedia Tools Appl. 78(7), 8559\u20138575 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6951-z","journal-title":"Multimedia Tools Appl."},{"key":"3214_CR8","doi-asserted-by":"publisher","first-page":"179891","DOI":"10.1109\/access.2019.2955990","volume":"7","author":"ZL Zhou","year":"2019","unstructured":"Zhou, Z.L., Cao, Y., Wang, M.M., Fan, E.M., Wu, Q.M.J.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7, 179891\u2013179897 (2019). https:\/\/doi.org\/10.1109\/access.2019.2955990","journal-title":"IEEE Access"},{"key":"3214_CR9","doi-asserted-by":"publisher","first-page":"107022","DOI":"10.1016\/j.knosys.2021.107022","volume":"223","author":"L Liu","year":"2021","unstructured":"Liu, L., Meng, L., Peng, Y., Wang, X.: A Data Hiding Scheme Based on U-Net and Wavelet Transform. Knowl. Based Syst. 223, 107022 (2021). (Web)","journal-title":"Knowl. Based Syst."},{"key":"3214_CR10","first-page":"2069","volume":"30","author":"S Baluja","year":"2017","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Adv. Neural. Inf. Process. Syst. 30, 2069\u20132079 (2017)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3214_CR11","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: International Workshop on Information Forensics and Security, pp. 234\u2013239 (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"3214_CR12","doi-asserted-by":"crossref","unstructured":"V. Holub, J. Fridrich. Digital image steganography using universal distortion. Proceedings of ACM Information Hiding and Multimedia Security Workshop, 2013, 59\u201368.","DOI":"10.1145\/2482513.2482514"},{"key":"3214_CR13","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., et al.: A new cost functions for spatial image steganography. In: Proceeding of 2014 IEEE International Conference on Image Processing, pp. 4206\u20134210 (2014)","DOI":"10.1109\/ICIP.2014.7025854"},{"issue":"37","key":"3214_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume":"21","author":"A Westfeld","year":"2001","unstructured":"Westfeld, A.: F5\u2014A steganographic algorithm high capacity despite better steganalysis. Lect. Notes Comput. Sci. 21(37), 289\u2013302 (2001)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"1","key":"3214_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. Euras. J. Inf. Secur. 2014(1), 1 (2014)","journal-title":"Euras. J. Inf. Secur."},{"key":"3214_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dsp.2019.06.016","volume":"93","author":"X Wu","year":"2019","unstructured":"Wu, X., Yang, C.N.: Partial reversible AMBTC-based secret image sharing with steganography. Digital Signal Process. 93, 22\u201333 (2019). https:\/\/doi.org\/10.1016\/j.dsp.2019.06.016","journal-title":"Digital Signal Process."},{"issue":"4","key":"3214_CR17","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s42044-020-00077-9","volume":"4","author":"MS Subhedar","year":"2021","unstructured":"Subhedar, M.S.: Cover selection technique for secure transform domain image steganography. Iran J. Comput. Sci. 4(4), 241\u2013252 (2021). https:\/\/link.springer.com\/article\/10.1007\/s42044-020-00077-9","journal-title":"Iran J. Comput. Sci."},{"key":"3214_CR18","first-page":"201","volume":"11433","author":"D Volkhonskiy","year":"2017","unstructured":"Volkhonskiy, D., Nazarov, I., Borisenko, B., et al.: Steganographic generative adversarial networks. Inf. Hiding Multimedia Secur. 11433, 201\u2013208 (2017)","journal-title":"Inf. Hiding Multimedia Secur."},{"key":"3214_CR19","volume-title":"SSGAN: Secure Steganography Based on Generative Adversarial Networks","author":"H Shi","year":"2017","unstructured":"Shi, H., Dong, J., Wang, W., et al.: SSGAN: Secure Steganography Based on Generative Adversarial Networks. Springer, Cham (2017)"},{"issue":"99","key":"3214_CR20","first-page":"1","volume":"66","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., et al.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 66(99), 1 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"3214_CR21","doi-asserted-by":"publisher","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","volume":"6","author":"D Hu","year":"2018","unstructured":"Hu, D., Wang, L., Jiang, W., et al.: A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6, 38303\u201338314 (2018)","journal-title":"IEEE Access"},{"key":"3214_CR22","first-page":"37","volume":"27","author":"P Baldi","year":"2012","unstructured":"Baldi, P., Guyon, G., Dror, V., et al.: Autoencoders, unsupervised learning and deep architectures. Workshop Confer. Proc. 27, 37\u201350 (2012)","journal-title":"Workshop Confer. Proc."},{"key":"3214_CR23","first-page":"2069","volume":"30","author":"S Baluja","year":"2017","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Proc. Adv. Neural Inf. Process. Syst. (NIPS) 30, 2069\u20132079 (2017)","journal-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)"},{"key":"3214_CR24","unstructured":"Rehman, A.U., Rahim, R., Nadeem, S., et al.: End-to-end trained CNN encoder-decoder networks for image steganography (2018)"},{"key":"3214_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, R., Dong, S., Liu, J.: Invisible steganography via generative adversarial networks. Multimedia Tools Appl. (2019)","DOI":"10.1007\/s11042-018-6951-z"},{"key":"3214_CR26","first-page":"9317","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., et al.: Reversible image steganography scheme based on a U-net structure. IEEE Access 7, 9317\u20139323 (2019)","journal-title":"IEEE Access"},{"key":"3214_CR27","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-net: Convolutional networks for biomedical image segmentation.\u201d In: International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"3","key":"3214_CR28","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MMUL.2009.43","volume":"16","author":"YM Cheng","year":"2009","unstructured":"Cheng, Y.M., Wang, C.M.: A Novel Approach to Steganography in High- Dynamic-Range Images. IEEE Multimedia 16(3), 70\u201380 (2009). (Web)","journal-title":"IEEE Multimedia"},{"issue":"5","key":"3214_CR29","first-page":"225","volume":"32","author":"CM Yu","year":"2011","unstructured":"Yu, C.M., Wu, K.C., Wang, C.M.: A distortion-free data hiding scheme for high dynamic range images. Multimedia Tools Appl. 32(5), 225\u2013236 (2011)","journal-title":"Multimedia Tools Appl."},{"key":"3214_CR30","first-page":"22","volume":"01","author":"CC Chang","year":"2013","unstructured":"Chang, C.C., Nguyen, T.S., Lin, C.C.: Distortion-free data embedding scheme for high dynamic range images. J. Electron. Sci. Technol. 01, 22\u201328 (2013)","journal-title":"J. Electron. Sci. Technol."},{"issue":"1","key":"3214_CR31","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TMM.2016.2605499","volume":"19","author":"Y Lin","year":"2017","unstructured":"Lin, Y., Wang, C., Chen, W., et al.: A novel data hiding algorithm for high dynamic range images. IEEE Trans. Multimedia 19(1), 196\u2013211 (2017)","journal-title":"IEEE Trans. Multimedia"},{"issue":"20","key":"3214_CR32","doi-asserted-by":"publisher","first-page":"29137","DOI":"10.1007\/s11042-018-6589-x","volume":"78","author":"X He","year":"2018","unstructured":"He, X., Zhang, W., Zhang, H., Ma, L., Li, Y.: Reversible data hiding for high dynamic range images using edge information. Multimedia Tools Appl. 78(20), 29137\u201329160 (2018). (Web)","journal-title":"Multimedia Tools Appl."},{"key":"3214_CR33","doi-asserted-by":"publisher","first-page":"107579","DOI":"10.1016\/j.sigpro.2020.107579","volume":"173","author":"X Gao","year":"2020","unstructured":"Gao, X., Pan, Z., Gao, E., Fan, G.: Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction. Signal Process. 173, 107579 (2020). (Web)","journal-title":"Signal Process."},{"key":"3214_CR34","doi-asserted-by":"crossref","unstructured":"Bai, Y., Jiang, G., Zhu, Z., Xu, H., Song, Y.:Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process. Image Commun. 91 (2021). Web.","DOI":"10.1016\/j.image.2020.116084"},{"key":"3214_CR35","doi-asserted-by":"publisher","first-page":"73009","DOI":"10.1109\/ACCESS.2018.2881680","volume":"6","author":"Y Ke","year":"2018","unstructured":"Ke, Y., Liu, J., Zhang, M.Q., Su, T.T., Yang, X.Y.: Steganography Security: Principle and Practice. IEEE Access 6, 73009\u201373022 (2018). (Web)","journal-title":"IEEE Access"},{"key":"3214_CR36","unstructured":"Technical Introduction to OpenEXR. https:\/\/openexr.com\/en\/latest\/TechnicalIntroduction.html"},{"key":"3214_CR37","doi-asserted-by":"crossref","unstructured":"Xiao, X., Shen, L., Luo, Z., et al.: Weighted Res-UNet for high-quality retina vessel segmentation. In: 9th International Conference on Information Technology in Medicine and Education (ITME), Hang zhou, China, pp.\n327\u2013331 (2018)","DOI":"10.1109\/ITME.2018.00080"},{"key":"3214_CR38","doi-asserted-by":"publisher","unstructured":"Goljan, M., Fridrich, J., Cogranne, R.: Rich model for Steganalysis of color images. In: IEEE International Workshop on Information Forensics and Security, Atlanta, GA, USA, pp. 185\u2013190 (2014). https:\/\/doi.org\/10.1109\/WIFS.2014.7084325","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"3214_CR39","doi-asserted-by":"crossref","unstructured":"Liu. Y., Lai, W., Chen, Y., et al.: Single-Image HDR Reconstruction by Learning to Reverse the Camera Pipeline. Proceedings of the IEEE Computer Society Conference on CVPR, pp. 1648-1657 (2020). https:\/\/github.com\/alex04072000\/SingleHDR","DOI":"10.1109\/CVPR42600.2020.00172"},{"key":"3214_CR40","unstructured":"https:\/\/hdrihaven.com\/hdris"},{"key":"3214_CR41","unstructured":"https:\/\/hdri-skies.com"},{"key":"3214_CR42","unstructured":"http:\/\/scarlet.stanford.edu\/brian\/hdr\/hdr.html"},{"issue":"1","key":"3214_CR43","doi-asserted-by":"publisher","first-page":"010501","DOI":"10.1117\/1.JEI.24.1.010501","volume":"24","author":"M Narwaria","year":"2015","unstructured":"Narwaria, M., et al.: HDR-VDP-2.2: a calibrated method for objective quality prediction of high-dynamic range and standard images. J. Electron. Imaging 24(1), 010501 (2015)","journal-title":"J. Electron. Imaging"},{"key":"3214_CR44","doi-asserted-by":"publisher","first-page":"21966","DOI":"10.1109\/ACCESS.2020.2969524","volume":"8","author":"F Chen","year":"2020","unstructured":"Chen, F., Xing, Q., Liu, F.: Technology of Hiding and Protecting the Secret Image Based on Two-Channel Deep Hiding Network. IEEE Access 8, 21966\u201321979 (2020). (Web)","journal-title":"IEEE Access"},{"key":"3214_CR45","doi-asserted-by":"crossref","unstructured":"Van, T.P., Dinh, T.H., Thanh, T.M.:Simultaneous convolutional neural network for highly efficient image steganography. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT), pp. 410\u201315 (2019). Web","DOI":"10.1109\/ISCIT.2019.8905216"},{"issue":"1","key":"3214_CR46","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TMM.2016.2605499","volume":"19","author":"YT Lin","year":"2017","unstructured":"Lin, Y.T., Wang, C.M., Chen, W.S., Lin, F.P., Lin, W.: A Novel Data Hiding Algorithm for High Dynamic Range Images. IEEE Trans. Multimedia 19(1), 196\u2013211 (2017). (Web)","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"3214_CR47","first-page":"2021","volume":"7","author":"MT Li","year":"2011","unstructured":"Li, M.T., Huang, N.C., Wang, C.M.: A data hiding scheme for high dynamic range images. Int. J. Innov. Comput. Inf. Control 7(5), 2021\u20132035 (2011)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"3214_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107022","volume":"223","author":"L Liu","year":"2021","unstructured":"Liu, L., Meng, L., Peng, Y., et al.: A data hiding scheme based on U-Net and wavelet transform. Knowl.-Based Syst. 223, 107022 (2021)","journal-title":"Knowl.-Based Syst."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03214-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-023-03214-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-03214-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T16:16:52Z","timestamp":1730909812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-023-03214-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":48,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["3214"],"URL":"https:\/\/doi.org\/10.1007\/s00371-023-03214-0","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,6]]},"assertion":[{"value":"28 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}