{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:05:30Z","timestamp":1772643930388,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00371-025-04277-x","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T12:54:56Z","timestamp":1764680096000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Large-capacity HDR image steganography based on deep learning"],"prefix":"10.1007","volume":"42","author":[{"given":"Longzhi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yongqing","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"4277_CR1","doi-asserted-by":"publisher","unstructured":"Jenynof, A., Ahmad, T.: Image to image steganography using u-net architecture with mobilenet convolutional neural network. In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20137 (2023). https:\/\/doi.org\/10.1109\/ICCCNT56998.2023.10306352","DOI":"10.1109\/ICCCNT56998.2023.10306352"},{"key":"4277_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124390","volume":"254","author":"B Song","year":"2024","unstructured":"Song, B., Wei, P., Wu, S., Lin, Y., Zhou, W.: A survey on deep-learning-based image steganography. Expert Syst. Appl. 254, 124390 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.124390","journal-title":"Expert Syst. Appl."},{"key":"4277_CR3","doi-asserted-by":"crossref","unstructured":"Li, G., Li, S., Luo, Z., Qian, Z., Zhang, X.: Purified and unified steganographic network. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 27569\u201327578 (2024)","DOI":"10.1109\/CVPR52733.2024.02603"},{"key":"4277_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127314","volume":"576","author":"X Duan","year":"2024","unstructured":"Duan, X., Li, C., Wei, B., Wu, G., Qin, C., Nam, H.: Dhu-net: high-capacity binary data hiding network based on improved u-net. Neurocomputing 576, 127314 (2024). https:\/\/doi.org\/10.1016\/j.neucom.2024.127314","journal-title":"Neurocomputing"},{"key":"4277_CR5","doi-asserted-by":"publisher","unstructured":"Hassaballah, M., Hameed, M.A., Alkinani, M.H.: 1 - introduction to digital image steganography. In: Hassaballah, M. (ed.) Digital Media Steganography, pp. 1\u201315. Academic Press (2020). https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00009-8","DOI":"10.1016\/B978-0-12-819438-6.00009-8"},{"key":"4277_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.ijcce.2024.08.002","volume":"5","author":"MA Hameed","year":"2024","unstructured":"Hameed, M.A., Hassaballah, M., Abdelazim, R., Sahu, A.K.: A novel medical steganography technique based on adversarial neural cryptography and digital signature using least significant bit replacement. Int. J. Cogn. Comput. Eng. 5, 379\u2013397 (2024). https:\/\/doi.org\/10.1016\/j.ijcce.2024.08.002","journal-title":"Int. J. Cogn. Comput. Eng."},{"issue":"6","key":"4277_CR7","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TCSS.2023.3268950","volume":"10","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., Wu, Q., Xue, M.: Data hiding with deep learning: a survey unifying digital watermarking and steganography. IEEE Trans. Comput. Soc. Syst. 10(6), 2985\u20132999 (2023). https:\/\/doi.org\/10.1109\/TCSS.2023.3268950","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"4277_CR8","doi-asserted-by":"publisher","first-page":"8817","DOI":"10.1109\/TIFS.2024.3463547","volume":"19","author":"F Li","year":"2024","unstructured":"Li, F., Sheng, Y., Wu, K., Qin, C., Zhang, X.: Lidinet: a lightweight deep invertible network for image-in-image steganography. IEEE Trans. Inf. Forensics Secur. 19, 8817\u20138831 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3463547","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4277_CR9","doi-asserted-by":"crossref","unstructured":"Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10816\u201310825 (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"4277_CR10","doi-asserted-by":"publisher","unstructured":"Chen, Z., Liu, T., Huang, J.-J., Zhao, W., Bi, X., Wang, M.: Invertible mosaic image hiding network for very large capacity image steganography. In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4520\u20134524 (2024). https:\/\/doi.org\/10.1109\/ICASSP48485.2024.10448382","DOI":"10.1109\/ICASSP48485.2024.10448382"},{"issue":"1","key":"4277_CR11","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2023","unstructured":"Guan, Z., Jing, J., Deng, X., Xu, M., Jiang, L., Zhang, Z., Li, Y.: Deepmih: deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2023). https:\/\/doi.org\/10.1109\/TPAMI.2022.3141725","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"03","key":"4277_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MMUL.2009.43","volume":"16","author":"C-M Wang","year":"2009","unstructured":"Wang, C.-M., Cheng, Y.-M.: A novel approach to steganography in high- dynamic-range images. IEEE Multimed. 16(03), 70\u201380 (2009). https:\/\/doi.org\/10.1109\/MMUL.2009.43","journal-title":"IEEE Multimed."},{"key":"4277_CR13","doi-asserted-by":"publisher","DOI":"10.1117\/12.838002","volume":"7541","author":"T Filler","year":"2010","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing embedding impact in steganography using trellis-coded quantization. Media Foren. Secur. II 7541, 754105 (2010). https:\/\/doi.org\/10.1117\/12.838002","journal-title":"Media Foren. Secur. II"},{"issue":"1","key":"4277_CR14","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11042-014-2279-5","volume":"75","author":"C-C Chang","year":"2016","unstructured":"Chang, C.-C., Nguyen, T.-S., Lin, C.-C.: A new distortion-free data embedding scheme for high-dynamic range images. Multimed. Tools Appl. 75(1), 145\u2013163 (2016). https:\/\/doi.org\/10.1007\/s11042-014-2279-5","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"4277_CR15","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TMM.2016.2605499","volume":"19","author":"Y-T Lin","year":"2017","unstructured":"Lin, Y.-T., Wang, C.-M., Chen, W.-S., Lin, F.-P., Lin, W.: A novel data hiding algorithm for high dynamic range images. IEEE Trans. Multimed. 19(1), 196\u2013211 (2017). https:\/\/doi.org\/10.1109\/TMM.2016.2605499","journal-title":"IEEE Trans. Multimed."},{"key":"4277_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116084","volume":"91","author":"Y Bai","year":"2021","unstructured":"Bai, Y., Jiang, G., Zhu, Z., Xu, H., Song, Y.: Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process. Image Commun. 91, 116084 (2021). https:\/\/doi.org\/10.1016\/j.image.2020.116084","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"4277_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s13640-015-0100-7","volume":"2016","author":"E Maiorana","year":"2016","unstructured":"Maiorana, E., Campisi, P.: High-capacity watermarking of high dynamic range images. Eurasip J. Image Video Process. 2016(1), 3 (2016). https:\/\/doi.org\/10.1186\/s13640-015-0100-7","journal-title":"Eurasip J. Image Video Process."},{"key":"4277_CR18","doi-asserted-by":"publisher","unstructured":"Wang, Z.-H., Lin, T.-Y., Chang, C.-C., Lin, C.-C.: A novel distortion-free data hiding scheme for high dynamic range images. In: 2012 Fourth International Conference on Digital Home, pp. 33\u201338 (2012). https:\/\/doi.org\/10.1109\/ICDH.2012.49","DOI":"10.1109\/ICDH.2012.49"},{"issue":"5","key":"4277_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.displa.2011.02.004","volume":"32","author":"C-M Yu","year":"2011","unstructured":"Yu, C.-M., Wu, K.-C., Wang, C.-M.: A distortion-free data hiding scheme for high dynamic range images. Displays 32(5), 225\u2013236 (2011). https:\/\/doi.org\/10.1016\/j.displa.2011.02.004","journal-title":"Displays"},{"issue":"6","key":"4277_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","volume":"4","author":"S Gupta","year":"2012","unstructured":"Gupta, S., Goyal, A., Bhushan, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Mod. Educ. Comput. Sci. 4(6), 27 (2012). https:\/\/doi.org\/10.5815\/ijmecs.2012.06.04","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"key":"4277_CR21","doi-asserted-by":"publisher","unstructured":"Setiadi, D.R.I.M.: Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J. King Saud Univ. Comput. Inf. Sci. 34(2), 104\u2013114 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.007","DOI":"10.1016\/j.jksuci.2019.12.007"},{"key":"4277_CR22","doi-asserted-by":"publisher","unstructured":"Pan, F., Li, J., Yang, X.: Image steganography method based on pvd and modulus function. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 282\u2013284 (2011). https:\/\/doi.org\/10.1109\/ICECC.2011.6067590","DOI":"10.1109\/ICECC.2011.6067590"},{"key":"4277_CR23","doi-asserted-by":"publisher","first-page":"185189","DOI":"10.1109\/ACCESS.2019.2960254","volume":"7","author":"MA Hameed","year":"2019","unstructured":"Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradient and pvd-lsb techniques. IEEE Access 7, 185189\u2013185204 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2960254","journal-title":"IEEE Access"},{"issue":"12","key":"4277_CR24","doi-asserted-by":"publisher","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"M Abdel Hameed","year":"2018","unstructured":"Abdel Hameed, M., Aly, S., Hassaballah, M.: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimed. Tools Appl. 77(12), 14705\u201314723 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5056-4","journal-title":"Multimed. Tools Appl."},{"key":"4277_CR25","doi-asserted-by":"publisher","unstructured":"Sahu, A.K., Swain, G.: High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. 34(4), 1395\u20131409 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2019.07.004","DOI":"10.1016\/j.jksuci.2019.07.004"},{"key":"4277_CR26","doi-asserted-by":"publisher","unstructured":"Hassaballah, M., Hameed, M.A., Aly, S., AbdelRady, A.S.: 2 - a color image steganography method based on adpvd and hog techniques. In: Hassaballah, M. (ed.) Digital Media Steganography, pp. 17\u201340. Academic Press (2020). https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00010-4","DOI":"10.1016\/B978-0-12-819438-6.00010-4"},{"key":"4277_CR27","unstructured":"JSteg. https:\/\/zooid.org\/~paul\/crypto\/jsteg"},{"issue":"5","key":"4277_CR28","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s12652-022-04366-y","volume":"14","author":"MA Hameed","year":"2023","unstructured":"Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J. Ambient. Intell. Humaniz. Comput. 14(5), 4639\u20134657 (2023). https:\/\/doi.org\/10.1007\/s12652-022-04366-y","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"4277_CR29","doi-asserted-by":"publisher","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Information Hiding, Berlin, Heidelberg, pp. 161\u2013177 (2010). https:\/\/doi.org\/10.1007\/978-3-642-16435-4_13","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"4277_CR30","doi-asserted-by":"publisher","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239 (2012)https:\/\/doi.org\/10.1109\/WIFS.2012.6412655","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"4277_CR31","doi-asserted-by":"publisher","unstructured":"Holub, V., Fridrich, J.: Digital image steganography using universal distortion. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, pp. 59\u201368 (2013). https:\/\/doi.org\/10.1145\/2482513.2482514","DOI":"10.1145\/2482513.2482514"},{"key":"4277_CR32","doi-asserted-by":"publisher","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206\u20134210 (2014). https:\/\/doi.org\/10.1109\/ICIP.2014.7025854","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"4277_CR33","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5\u2014a steganographic algorithm. In: Information Hiding, Berlin, Heidelberg, pp. 289\u2013302 (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"1","key":"4277_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014). https:\/\/doi.org\/10.1186\/1687-417X-2014-1","journal-title":"EURASIP J. Inf. Secur."},{"key":"4277_CR35","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dsp.2019.06.016","volume":"93","author":"X Wu","year":"2019","unstructured":"Wu, X., Yang, C.-N.: Partial reversible AMBTC-based secret image sharing with steganography. Digit. Signal Process. 93, 22\u201333 (2019). https:\/\/doi.org\/10.1016\/j.dsp.2019.06.016","journal-title":"Digit. Signal Process."},{"issue":"4","key":"4277_CR36","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s42044-020-00077-9","volume":"4","author":"MS Subhedar","year":"2021","unstructured":"Subhedar, M.S.: Cover selection technique for secure transform domain image steganography. Iran J. Comput. Sci. 4(4), 241\u2013252 (2021). https:\/\/doi.org\/10.1007\/s42044-020-00077-9","journal-title":"Iran J. Comput. Sci."},{"key":"4277_CR37","doi-asserted-by":"publisher","unstructured":"Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision (ICMV 2019), vol. 11433, pp. 114333 (2020). https:\/\/doi.org\/10.1117\/12.2559429","DOI":"10.1117\/12.2559429"},{"key":"4277_CR38","doi-asserted-by":"publisher","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: Ssgan: Secure steganography based on generative adversarial networks. In: Advances in Multimedia Information Processing \u2013 PCM 2017, Cham, pp. 534\u2013544 (2018). https:\/\/doi.org\/10.1007\/978-3-319-77380-3_51","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"4277_CR39","unstructured":"Baluja, S.: Hiding images in plain sight: Deep steganography. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"4277_CR40","unstructured":"Rehman, A., Rahim, R., Nadeem, S., Hussain, S.: End-to-end trained CNN encoder-decoder networks for image steganography. In: Proceedings of the European Conference on Computer Vision (ECCV) Workshops (2018)"},{"key":"4277_CR41","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., Qin, C.: Reversible image steganography scheme based on a u-net structure. IEEE Access 7, 9314\u20139323 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2891247","journal-title":"IEEE Access"},{"key":"4277_CR42","doi-asserted-by":"publisher","unstructured":"Duan, X., Li, B., Xie, Z., Yue, D., Y.M.: High-capacity information hiding based on residual network. IETE Tech. Rev. 38(1), 172\u2013183 (2021). https:\/\/doi.org\/10.1080\/02564602.2020.1808097","DOI":"10.1080\/02564602.2020.1808097"},{"issue":"3","key":"4277_CR43","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00530-024-01332-w","volume":"30","author":"MA Hameed","year":"2024","unstructured":"Hameed, M.A., Hassaballah, M., Qiao, T.: IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks. Multimedia Syst. 30(3), 129 (2024). https:\/\/doi.org\/10.1007\/s00530-024-01332-w","journal-title":"Multimedia Syst."},{"key":"4277_CR44","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: Hinet: Deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"4277_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107579","volume":"173","author":"X Gao","year":"2020","unstructured":"Gao, X., Pan, Z., Gao, E., Fan, G.: Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction. Signal Process. 173, 107579 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107579","journal-title":"Signal Process."},{"issue":"11","key":"4277_CR46","doi-asserted-by":"publisher","first-page":"7887","DOI":"10.1007\/s00371-023-03214-0","volume":"40","author":"Y Huo","year":"2024","unstructured":"Huo, Y., Qiao, Y., Liu, Y.: A deep learning-based steganography method for high dynamic range images. Vis. Comput. 40(11), 7887\u20137903 (2024). https:\/\/doi.org\/10.1007\/s00371-023-03214-0","journal-title":"Vis. Comput."},{"key":"4277_CR47","doi-asserted-by":"crossref","unstructured":"Yan, Q., Gong, D., Shi, Q., Hengel, A.v.d., Shen, C., Reid, I., Zhang, Y.: Attention-guided network for ghost-free high dynamic range imaging. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2019)","DOI":"10.1109\/CVPR.2019.00185"},{"key":"4277_CR48","doi-asserted-by":"crossref","unstructured":"Liu, Y.-L., Lai, W.-S., Chen, Y.-S., Kao, Y.-L., Yang, M.-H., Chuang, Y.-Y., Huang, J.-B.: Single-image HDR reconstruction by learning to reverse the camera pipeline. In: IEEE Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00172"},{"key":"4277_CR49","doi-asserted-by":"crossref","unstructured":"Kalantari, N.K., Ramamoorthi, R.: Deep high dynamic range imaging of dynamic scenes. ACM Transactions on Graphics (Proceedings of SIGGRAPH 2017) 36(4) (2017)","DOI":"10.1145\/3072959.3073609"},{"key":"4277_CR50","doi-asserted-by":"publisher","unstructured":"Ayd?n, T.O., Mantiuk, R., Seidel, H.-P.: Extending quality metrics to full luminance range images. In: Human Vision and Electronic Imaging XIII 6806, 68060 (2008). https:\/\/doi.org\/10.1117\/12.765095","DOI":"10.1117\/12.765095"},{"key":"4277_CR51","doi-asserted-by":"publisher","unstructured":"Narwaria, M., Mantiuk, R., Silva, M.P.D., Callet, P.L.: Hdr-vdp-2.2: a calibrated method for objective quality prediction of high-dynamic range and standard images. J. Electron. Imaging 24(1), 010501 (2015) https:\/\/doi.org\/10.1117\/1.JEI.24.1.010501","DOI":"10.1117\/1.JEI.24.1.010501"},{"key":"4277_CR52","doi-asserted-by":"publisher","first-page":"21966","DOI":"10.1109\/ACCESS.2020.2969524","volume":"8","author":"F Chen","year":"2020","unstructured":"Chen, F., Xing, Q., Liu, F.: Technology of hiding and protecting the secret image based on two-channel deep hiding network. IEEE Access 8, 21966\u201321979 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969524","journal-title":"IEEE Access"},{"key":"4277_CR53","doi-asserted-by":"publisher","unstructured":"Van, T.P., Dinh, T.H., Thanh, T.M.: Simultaneous convolutional neural network for highly efficient image steganography. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT), pp. 410\u2013415 (2019). https:\/\/doi.org\/10.1109\/ISCIT.2019.8905216","DOI":"10.1109\/ISCIT.2019.8905216"},{"issue":"4","key":"4277_CR54","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimed. 8(4), 22\u201328 (2001). https:\/\/doi.org\/10.1109\/93.959097","journal-title":"IEEE Multimed."},{"issue":"3","key":"4277_CR55","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012). https:\/\/doi.org\/10.1109\/TIFS.2012.2190402","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04277-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-025-04277-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04277-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T13:00:21Z","timestamp":1772629221000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-025-04277-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["4277"],"URL":"https:\/\/doi.org\/10.1007\/s00371-025-04277-x","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"27 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"3"}}