{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:20:57Z","timestamp":1770830457573,"version":"3.50.1"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00530-024-01332-w","type":"journal-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T09:02:25Z","timestamp":1713776545000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["IS-DGM: an improved steganography method based on a\u00a0deep generative model and hyper logistic map encryption via social media networks"],"prefix":"10.1007","volume":"30","author":[{"given":"Mohamed Abdel","family":"Hameed","sequence":"first","affiliation":[]},{"given":"M.","family":"Hassaballah","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,22]]},"reference":[{"key":"1332_CR1","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s00530-021-00763-z","volume":"27","author":"R Patel","year":"2021","unstructured":"Patel, R., Lad, K., Patel, M.: Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review. Multimedia Syst. 27, 985\u20131024 (2021)","journal-title":"Multimedia Syst."},{"key":"1332_CR2","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/s00530-020-00665-6","volume":"27","author":"A Sukumar","year":"2021","unstructured":"Sukumar, A., Subramaniyaswamy, V., Ravi, L., Vijayakumar, V., Indragandhi, V.: Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning. Multimedia Syst. 27, 651\u2013666 (2021)","journal-title":"Multimedia Syst."},{"issue":"2","key":"1332_CR3","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s00530-019-00624-w","volume":"26","author":"Z Su","year":"2020","unstructured":"Su, Z., Li, W., Zhang, G., Hu, D., Zhou, X.: A steganographic method based on gain quantization for iLBC speech streams. Multimedia Syst. 26(2), 223\u2013233 (2020)","journal-title":"Multimedia Syst."},{"issue":"7","key":"1332_CR4","doi-asserted-by":"crossref","first-page":"8398","DOI":"10.1109\/TVT.2023.3247180","volume":"72","author":"W Wu","year":"2023","unstructured":"Wu, W., Dai, J., Huang, H., Zhao, Q., Zeng, G., Li, R.: A digital watermark method for in-vehicle network security enhancement. IEEE Trans. Vehicular Technol. 72(7), 8398\u20138408 (2023)","journal-title":"IEEE Trans. Vehicular Technol."},{"key":"1332_CR5","doi-asserted-by":"crossref","unstructured":"Magdy, M., Ghali, N.I., Ghoniemy, S., Hosny, K.M.: Image cryptography: A systematic review. In: 5th International Conference on Computing and Informatics, pp. 064\u2013073. IEEE (2022)","DOI":"10.1109\/ICCI54321.2022.9756107"},{"issue":"3","key":"1332_CR6","first-page":"1228","volume":"14","author":"I Hussain","year":"2020","unstructured":"Hussain, I., Zeng, J., Qin, X., Tan, S.: A survey on deep convolutional neural networks for image steganography and steganalysis. KSII Trans. Internet Inform. Syst. 14(3), 1228\u20131248 (2020)","journal-title":"KSII Trans. Internet Inform. Syst."},{"issue":"16","key":"1332_CR7","doi-asserted-by":"crossref","first-page":"24069","DOI":"10.1007\/s11042-022-13630-4","volume":"82","author":"AK Sahu","year":"2023","unstructured":"Sahu, A.K., Hassaballah, M., Rao, R.S., Suresh, G.: Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimedia Tools Appl. 82(16), 24069\u201324100 (2023)","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"1332_CR8","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2023","unstructured":"Sahu, A.K., Sahu, M., Patro, P., Sahu, G., Nayak, S.R.: Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal. Appl. 26(2), 571\u2013590 (2023)","journal-title":"Pattern Anal. Appl."},{"issue":"3","key":"1332_CR9","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1002\/spy2.281","volume":"6","author":"A Kumar","year":"2023","unstructured":"Kumar, A., Rani, R., Singh, S.: A survey of recent advances in image steganography. Secur. Privacy 6(3), 281 (2023)","journal-title":"Secur. Privacy"},{"issue":"7","key":"1332_CR10","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.3390\/s17071482","volume":"17","author":"C-T Li","year":"2017","unstructured":"Li, C.-T., Wu, T.-Y., Chen, C.-L., Lee, C.-C., Chen, C.-M.: An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7), 1482 (2017)","journal-title":"Sensors"},{"issue":"4","key":"1332_CR11","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1080\/23080477.2023.2239611","volume":"11","author":"LR Sultan","year":"2023","unstructured":"Sultan, L.R.: Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme. Smart Sci. 11(4), 677\u2013694 (2023)","journal-title":"Smart Sci."},{"issue":"1","key":"1332_CR12","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11042-022-13253-9","volume":"82","author":"KM Singh","year":"2023","unstructured":"Singh, K.M., Singh, L.D., Tuithung, T.: Improvement of image transmission using chaotic system and elliptic curve cryptography. Multimedia Tools Appl. 82(1), 1149\u20131170 (2023)","journal-title":"Multimedia Tools Appl."},{"key":"1332_CR13","doi-asserted-by":"crossref","first-page":"63027","DOI":"10.1109\/ACCESS.2023.3287858","volume":"11","author":"KM Hosny","year":"2023","unstructured":"Hosny, K.M., Zaki, M.A., Lashin, N.A., Fouda, M.M., Hamza, H.M.: Multimedia security using encryption: A survey. IEEE Access 11, 63027\u201363056 (2023)","journal-title":"IEEE Access"},{"key":"1332_CR14","doi-asserted-by":"crossref","unstructured":"Hassaballah, M., Hameed, M.A., Alkinani, M.H.: Introduction to digital image steganography. In: Digital Media Steganography, pp. 1\u201315. Elsevier, ??? (2020)","DOI":"10.1016\/B978-0-12-819438-6.00009-8"},{"issue":"12","key":"1332_CR15","doi-asserted-by":"crossref","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"MA Hameed","year":"2018","unstructured":"Hameed, M.A., Aly, S., Hassaballah, M.: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl. 77(12), 14705\u201314723 (2018)","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"1332_CR16","doi-asserted-by":"crossref","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","volume":"17","author":"M Hassaballah","year":"2021","unstructured":"Hassaballah, M., Hameed, M.A., Awad, A.I., Muhammad, K.: A novel image steganography method for industrial internet of things security. IEEE Trans. Industrial Inform. 17(11), 7743\u20137751 (2021)","journal-title":"IEEE Trans. Industrial Inform."},{"key":"1332_CR17","doi-asserted-by":"crossref","first-page":"185189","DOI":"10.1109\/ACCESS.2019.2960254","volume":"7","author":"MA Hameed","year":"2019","unstructured":"Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7, 185189\u2013185204 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"1332_CR18","first-page":"479","volume":"31","author":"R Sonar","year":"2022","unstructured":"Sonar, R., Swain, G.: A hybrid steganography technique based on RR, AQVD, and QVC. Inform. Secur. J. 31(4), 479\u2013498 (2022)","journal-title":"Inform. Secur. J."},{"key":"1332_CR19","doi-asserted-by":"crossref","first-page":"3137","DOI":"10.1109\/TMM.2023.3307970","volume":"26","author":"F Li","year":"2023","unstructured":"Li, F., Sheng, Y., Zhang, X., Qin, C.: iSCMIS: Spatial-channel attention based deep invertible network for multi-image steganography. IEEE Trans. Multimedia 26, 3137\u20133152 (2023)","journal-title":"IEEE Trans. Multimedia"},{"key":"1332_CR20","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri, P.K., Ashraf, Z., Goel, S.: A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl. Soft Comput. 92, 106257 (2020)","journal-title":"Appl. Soft Comput."},{"issue":"27","key":"1332_CR21","doi-asserted-by":"crossref","first-page":"41943","DOI":"10.1007\/s11042-023-14844-w","volume":"82","author":"J Kunhoth","year":"2023","unstructured":"Kunhoth, J., Subramanian, N., Al-Maadeed, S., Bouridane, A.: Video steganography: recent advances and challenges. Multimedia Tools Appl. 82(27), 41943\u201341985 (2023)","journal-title":"Multimedia Tools Appl."},{"key":"1332_CR22","volume":"203","author":"G Xie","year":"2023","unstructured":"Xie, G., Ren, J., Marshall, S., Zhao, H., Li, R.: A novel gradient-guided post-processing method for adaptive image steganography. Signal Process. 203, 108813 (2023)","journal-title":"Signal Process."},{"issue":"4","key":"1332_CR23","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/TIFS.2010.2056684","volume":"5","author":"J Kodovsk\u1ef3","year":"2010","unstructured":"Kodovsk\u1ef3, J., Fridrich, J.: Quantitative structural steganalysis of Jsteg. IEEE Trans. Inform. Forensics Secur. 5(4), 681\u2013693 (2010)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1332_CR24","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5\u2013a steganographic algorithm. In: International Workshop on Information Hiding, pp. 289\u2013302 (2001). Springer","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"5","key":"1332_CR25","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285\u2013287 (2006)","journal-title":"IEEE Signal Process. Lett."},{"issue":"6","key":"1332_CR26","doi-asserted-by":"crossref","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty, S., Jalal, A.S., Bhatnagar, C.: LSB based non blind predictive edge adaptive image steganography. Multimedia Tools Appl. 76(6), 7973\u20137987 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"1332_CR27","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1016\/j.jksuci.2019.07.004","volume":"34","author":"AK Sahu","year":"2022","unstructured":"Sahu, A.K., Swain, G.: High fidelity based reversible data hiding using modified LSB matching and pixel difference. Journal of King Saud University-Computer and Information Sciences 34(4), 1395\u20131409 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"1332_CR28","volume":"168","author":"X Yu","year":"2020","unstructured":"Yu, X., Chen, K., Wang, Y., Li, W., Zhang, W., Yu, N.: Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process. 168, 107343 (2020)","journal-title":"Signal Process."},{"key":"1332_CR29","volume":"183","author":"L Zhu","year":"2021","unstructured":"Zhu, L., Luo, X., Yang, C., Zhang, Y., Liu, F.: Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Signal Process. 183, 108015 (2021)","journal-title":"Signal Process."},{"key":"1332_CR30","volume":"38","author":"AA AlSabhany","year":"2020","unstructured":"AlSabhany, A.A., Ali, A.H., Ridzuan, F., Azni, A., Mokhtar, M.R.: Digital audio steganography: Systematic review, classification, and analysis of the current state of the art. Comput. Scie.Rev. 38, 100316 (2020)","journal-title":"Comput. Scie.Rev."},{"key":"1332_CR31","doi-asserted-by":"crossref","first-page":"168994","DOI":"10.1109\/ACCESS.2019.2949622","volume":"7","author":"AH Mohsin","year":"2019","unstructured":"Mohsin, A.H., Zaidan, A., Zaidan, B., Albahri, O., Albahri, A., Alsalem, M., Mohammed, K., Nidhal, S., Jalood, N.S., Jasim, A.N., et al.: New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7, 168994\u2013169010 (2019)","journal-title":"IEEE Access"},{"key":"1332_CR32","first-page":"47","volume":"43","author":"Z Li","year":"2018","unstructured":"Li, Z., He, Y.: Steganography with pixel-value differencing and modulus function based on PSO. J. Inform. Secur. Appl. 43, 47\u201352 (2018)","journal-title":"J. Inform. Secur. Appl."},{"key":"1332_CR33","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/B978-0-12-819438-6.00010-4","volume-title":"Digital Media Steganography","author":"M Hassaballah","year":"2020","unstructured":"Hassaballah, M., Hameed, M.A., Aly, S., AbdelRady, A.: A color image steganography method based on ADPVD and HOG techniques. Digital Media Steganography, pp. 17\u201340. Elsevier (2020)"},{"key":"1332_CR34","doi-asserted-by":"crossref","unstructured":"Pevn\u1ef3, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding, pp. 161\u2013177 (2010). Springer","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"1332_CR35","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 234\u2013239 (2012). IEEE","DOI":"10.1109\/WIFS.2012.6412655"},{"issue":"2","key":"1332_CR36","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2015","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inform. Forensics Secur. 11(2), 221\u2013234 (2015)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"1","key":"1332_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V Holub","year":"2014","unstructured":"Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inform. Secur. 2014(1), 1\u201313 (2014)","journal-title":"EURASIP J. Inform. Secur."},{"issue":"8","key":"1332_CR38","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1109\/TIFS.2014.2326954","volume":"9","author":"B Li","year":"2014","unstructured":"Li, B., Tan, S., Wang, M., Huang, J.: Investigation on cost assignment in spatial image steganography. IEEE Trans. Inform. Forensics Secur. 9(8), 1264\u20131277 (2014)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1332_CR39","doi-asserted-by":"crossref","DOI":"10.1201\/9781351003827","volume-title":"Deep Learning in Computer Vision: Principles and Applications","author":"M Hassaballah","year":"2020","unstructured":"Hassaballah, M., Awad, A.I.: Deep Learning in Computer Vision: Principles and Applications. CRC Press, USA (2020)"},{"key":"1332_CR40","doi-asserted-by":"crossref","first-page":"21966","DOI":"10.1109\/ACCESS.2020.2969524","volume":"8","author":"F Chen","year":"2020","unstructured":"Chen, F., Xing, Q., Liu, F.: Technology of hiding and protecting the secret image based on two-channel deep hiding network. IEEE Access 8, 21966\u201321979 (2020)","journal-title":"IEEE Access"},{"key":"1332_CR41","doi-asserted-by":"crossref","unstructured":"Ferrari, F., McKelvey, F.: Hyperproduction: A social theory of deep generative models. Distinktion: Journal of Social Theory 24(2), 338\u2013360 (2023)","DOI":"10.1080\/1600910X.2022.2137546"},{"issue":"3","key":"1332_CR42","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3390\/fi12030043","volume":"12","author":"P Wu","year":"2020","unstructured":"Wu, P., Chang, X., Yang, Y., Li, X.: Basn-learning steganography with a binary attention mechanism. Future Internet 12(3), 43 (2020)","journal-title":"Future Internet"},{"key":"1332_CR43","volume":"167","author":"W Liu","year":"2020","unstructured":"Liu, W., Yin, X., Lu, W., Zhang, J., Zeng, J., Shi, S., Mao, M.: Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process. 167, 107287 (2020)","journal-title":"Signal Process."},{"key":"1332_CR44","doi-asserted-by":"crossref","unstructured":"Filler, T., Fridrich, J.: Minimizing additive distortion functions with non-binary embedding operation in steganography. In: IEEE International Workshop on Information Forensics and Security, pp. 1\u20136 (2010). IEEE","DOI":"10.1109\/WIFS.2010.5711444"},{"key":"1332_CR45","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108048","volume":"183","author":"T Qiao","year":"2021","unstructured":"Qiao, T., Wang, S., Luo, X., Zhu, Z.: Robust steganography resisting JPEG compression by improving selection of cover element. Signal Process. 183, 108048 (2021)","journal-title":"Signal Process."},{"key":"1332_CR46","doi-asserted-by":"crossref","unstructured":"ur Rehman, A., Rahim, R., Nadeem, S., ul Hussain, S.: End-to-end trained CNN encoder-decoder networks for image steganography. In: European Conference on Computer Vision Workshops, pp. 723\u2013729 (2019)","DOI":"10.1007\/978-3-030-11018-5_64"},{"key":"1332_CR47","unstructured":"Baluja, S.: Hiding images in plain sight: Deep steganography. Advances in neural information processing systems 30 (2017)"},{"issue":"7","key":"1332_CR48","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1332_CR49","doi-asserted-by":"crossref","unstructured":"Sharma, K., Aggarwal, A., Singhania, T., Gupta, D., Khanna, A.: Hiding data in images using cryptography and deep neural network. arXiv preprint arXiv:1912.10413 (2019)","DOI":"10.33969\/AIS.2019.11009"},{"key":"1332_CR50","doi-asserted-by":"crossref","first-page":"25777","DOI":"10.1109\/ACCESS.2020.2971528","volume":"8","author":"X Duan","year":"2020","unstructured":"Duan, X., Guo, D., Liu, N., Li, B., Gou, M., Qin, C.: A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access 8, 25777\u201325788 (2020)","journal-title":"IEEE Access"},{"issue":"12","key":"1332_CR51","doi-asserted-by":"crossref","first-page":"15949","DOI":"10.1109\/TPAMI.2023.3311447","volume":"45","author":"J Gao","year":"2023","unstructured":"Gao, J., Chen, M., Xu, C.: Vectorized evidential learning for weakly-supervised temporal action localization. IEEE Trans. Pattern Anal. Mach. Intell. 45(12), 15949\u201315963 (2023)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1332_CR52","doi-asserted-by":"crossref","first-page":"5410","DOI":"10.1109\/TMM.2023.3333206","volume":"26","author":"Y Hu","year":"2023","unstructured":"Hu, Y., Gao, J., Dong, J., Fan, B., Liu, H.: Exploring rich semantics for open-set action recognition. IEEE Trans. Multimedia 26, 5410\u20135421 (2023)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"1332_CR53","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/TCSVT.2021.3075470","volume":"32","author":"J Gao","year":"2021","unstructured":"Gao, J., Xu, C.: Learning video moment retrieval without a single annotated video. IEEE Trans. Circuits Syst. Video Technol. 32(3), 1646\u20131657 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"10","key":"1332_CR54","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/TPAMI.2020.2985708","volume":"43","author":"J Gao","year":"2020","unstructured":"Gao, J., Zhang, T., Xu, C.: Learning to model relationships for zero-shot video classification. IEEE Trans. Pattern Anal. Mach. Intell. 43(10), 3476\u20133491 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"11","key":"1332_CR55","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"1332_CR56","doi-asserted-by":"crossref","unstructured":"Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: 12th International Conference on Machine Vision, vol. 11433, pp. 991\u20131005 (2020). SPIE","DOI":"10.1117\/12.2559429"},{"key":"1332_CR57","first-page":"534","volume-title":"SSGAN: secure steganography based on generative adversarial networks","author":"H Shi","year":"2017","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang,  X.: SSGAN: secure steganography based on generative adversarial networks, pp. 534\u2013544. Springer (2017)"},{"key":"1332_CR58","doi-asserted-by":"crossref","unstructured":"Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10816\u201310825 (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"1332_CR59","doi-asserted-by":"crossref","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Dong, S., Liu, J.: Invisible steganography via generative adversarial networks. Multimedia Tools Appl. 78, 8559\u20138575 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"1332_CR60","unstructured":"Xintao, D., Nao, L.: Hide the image in FC-DenseNets to another image. arXiv preprint arXiv:1910.08341 (2019)"},{"key":"1332_CR61","doi-asserted-by":"crossref","unstructured":"Zhangjie, F., Wang, F., Xu, C.: The secure steganography for hiding images via GAN. EURASIP Journal on Image and Video Processing 2020(1) (2020)","DOI":"10.1186\/s13640-020-00534-2"},{"issue":"24","key":"1332_CR62","doi-asserted-by":"crossref","first-page":"7253","DOI":"10.3390\/s20247253","volume":"20","author":"X Duan","year":"2020","unstructured":"Duan, X., Gou, M., Liu, N., Wang, W., Qin, C.: High-capacity image steganography based on improved xception. Sensors 20(24), 7253 (2020)","journal-title":"Sensors"},{"issue":"16","key":"1332_CR63","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.3390\/math10162934","volume":"10","author":"X Zhu","year":"2022","unstructured":"Zhu, X., Lai, Z., Zhou, N., Wu, J.: Steganography with high reconstruction robustness: Hiding of encrypted secret images. Mathematics 10(16), 2934 (2022)","journal-title":"Mathematics"},{"issue":"7","key":"1332_CR64","doi-asserted-by":"crossref","first-page":"982","DOI":"10.3390\/e24070982","volume":"24","author":"Y-L Pan","year":"2022","unstructured":"Pan, Y.-L., Wu, J.-L.: Rate-distortion-based stego: A large-capacity secure steganography scheme for hiding digital images. Entropy 24(7), 982 (2022)","journal-title":"Entropy"},{"issue":"10","key":"1332_CR65","doi-asserted-by":"crossref","first-page":"30819","DOI":"10.1007\/s11042-023-16730-x","volume":"83","author":"J Fotsing","year":"2024","unstructured":"Fotsing, J., Moukam Kakmeni, J.-M., Tiedeu, A., Fotsin, H.: Image encryption algorithm based on 2D logistic map system in IoHT using 5G network. Multimedia Tools Appl. 83(10), 30819\u201330845 (2024)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"1332_CR66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s44147-023-00228-2","volume":"70","author":"AH Alrubaie","year":"2023","unstructured":"Alrubaie, A.H., Khodher, M.A.A., Abdulameer, A.T.: Image encryption based on 2DNA encoding and chaotic 2d logistic map. J. Eng. Appl. Sci. 70(1), 1\u201321 (2023)","journal-title":"J. Eng. Appl. Sci."},{"key":"1332_CR67","doi-asserted-by":"crossref","unstructured":"Li, Q., Chen, L.: An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding. Multimedia Tools and Applications, 1\u201318 (2023)","DOI":"10.1007\/s11042-023-15550-3"},{"issue":"3","key":"1332_CR68","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1007\/s00371-021-02382-1","volume":"39","author":"KM Hosny","year":"2023","unstructured":"Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted gegenbauer moments and 2D logistic-sine map. Visual Comput. 39(3), 1027\u20131044 (2023)","journal-title":"Visual Comput."},{"key":"1332_CR69","doi-asserted-by":"crossref","unstructured":"Darwish, M.M., Hosny, K.M., Kamal, S.T.: Improved color image watermarking using logistic maps and quaternion legendre-fourier moments. Multimedia security using chaotic maps: principles and methodologies, 137\u2013158 (2020)","DOI":"10.1007\/978-3-030-38700-6_6"},{"issue":"11","key":"1332_CR70","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.3390\/math11112585","volume":"11","author":"B Zhang","year":"2023","unstructured":"Zhang, B., Liu, L.: Chaos-based image encryption: Review, application, and challenges. Mathematics 11(11), 2585 (2023)","journal-title":"Mathematics"},{"issue":"9","key":"1332_CR71","doi-asserted-by":"crossref","first-page":"5728","DOI":"10.1109\/TII.2022.3155656","volume":"18","author":"S De","year":"2022","unstructured":"De, S., Bermudez-Edo, M., Xu, H., Cai, Z.: Deep generative models in the industrial internet of things: a survey. IEEE Trans. Industrial Inform. 18(9), 5728\u20135737 (2022)","journal-title":"IEEE Trans. Industrial Inform."},{"key":"1332_CR72","doi-asserted-by":"crossref","unstructured":"Amrutha, E., Arivazhagan, S., Sylvia Lilly\u00a0Jebarani, W.: MixNet: A robust mixture of convolutional neural networks as feature extractors to detect stego images created by content-adaptive steganography. Neural Processing Letters 54(2), 853\u2013870 (2022)","DOI":"10.1007\/s11063-021-10661-0"},{"key":"1332_CR73","doi-asserted-by":"crossref","first-page":"36322","DOI":"10.1109\/ACCESS.2019.2905015","volume":"7","author":"Z Pan","year":"2019","unstructured":"Pan, Z., Yu, W., Yi, X., Khan, A., Yuan, F., Zheng, Y.: Recent progress on generative adversarial networks (GANs): a survey. IEEE Access 7, 36322\u201336333 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"1332_CR74","first-page":"1","volume":"54","author":"Z Wang","year":"2021","unstructured":"Wang, Z., She, Q., Ward, T.E.: Generative adversarial networks in computer vision: a survey and taxonomy. ACM Comput. Surveys 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surveys"},{"key":"1332_CR75","doi-asserted-by":"crossref","first-page":"47304","DOI":"10.1109\/ACCESS.2023.3275134","volume":"11","author":"P Eigenschink","year":"2023","unstructured":"Eigenschink, P., Reutterer, T., Vamosi, S., Vamosi, R., Sun, C., Kalcher, K.: Deep generative models for synthetic sequential data: a survey. IEEE Access 11, 47304\u201347320 (2023)","journal-title":"IEEE Access"},{"issue":"18","key":"1332_CR76","doi-asserted-by":"crossref","first-page":"8972","DOI":"10.3390\/app12188972","volume":"12","author":"M Shafiq","year":"2022","unstructured":"Shafiq, M., Gu, Z.: Deep residual learning for image recognition: a survey. Appl. Sci. 12(18), 8972 (2022)","journal-title":"Appl. Sci."},{"key":"1332_CR77","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, inception-Resnet and the impact of residual connections on learning. In: AAAI Conference on Artificial Intelligence, vol. 31, pp. 4278\u20134284 (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"1332_CR78","doi-asserted-by":"crossref","unstructured":"Zhang, J., Feng, Z.: Inception densenet with hybrid activations for image classification. In: 6th International Conference on Systems and Informatics, pp. 1295\u20131301 (2019). IEEE","DOI":"10.1109\/ICSAI48974.2019.9010081"},{"key":"1332_CR79","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s10851-019-00890-3","volume":"62","author":"F Rousseau","year":"2020","unstructured":"Rousseau, F., Drumetz, L., Fablet, R.: Residual networks as flows of diffeomorphisms. J. Math. Imaging Vis. 62, 365\u2013375 (2020)","journal-title":"J. Math. Imaging Vis."},{"key":"1332_CR80","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700\u20134708 (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"1332_CR81","first-page":"1","volume":"2022","author":"T Zhou","year":"2022","unstructured":"Zhou, T., Ye, X., Lu, H., Zheng, X., Qiu, S., Liu, Y., et al.: Dense convolutional network and its application in medical image analysis. BioMed Res. Int. 2022, 1\u201322 (2022)","journal-title":"BioMed Res. Int."},{"issue":"9","key":"1332_CR82","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"K He","year":"2015","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans. Pattern Anal. Machine Intell. 37(9), 1904\u20131916 (2015)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"issue":"1","key":"1332_CR83","first-page":"1","volume":"3","author":"CP Roca","year":"2023","unstructured":"Roca, C.P., Burton, O.T., Neumann, J., Tareen, S., Whyte, C.E., Gergelits, V., Veiga, R.V., Humblet-Baron, S., Liston, A.: A cross entropy test allows quantitative statistical comparison of t-SNE and UMAP representations. Cell Reports Methods 3(1), 1\u201316 (2023)","journal-title":"Cell Reports Methods"},{"issue":"3","key":"1332_CR84","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A.C., Fei-Fei, L.: ImageNet Large Scale Visual Recognition Challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"issue":"5","key":"1332_CR85","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1007\/s12652-022-04366-y","volume":"14","author":"MA Hameed","year":"2023","unstructured":"Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J. Ambient Intell. Human. Comput. 14(5), 4639\u20134657 (2023)","journal-title":"J. Ambient Intell. Human. Comput."},{"issue":"4","key":"1332_CR86","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process"},{"key":"1332_CR87","volume":"115","author":"X Zhu","year":"2022","unstructured":"Zhu, X., Lai, Z., Liang, Y., Xiong, J., Wu, J.: Generative high-capacity image hiding based on residual cnn in wavelet domain. Appl. Soft Comput. 115, 108170 (2022)","journal-title":"Appl. Soft Comput."},{"key":"1332_CR88","doi-asserted-by":"crossref","unstructured":"Gupta, A., Dollar, P., Girshick, R.: Lvis: A dataset for large vocabulary instance segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 5356\u20135364 (2019)","DOI":"10.1109\/CVPR.2019.00550"},{"key":"1332_CR89","unstructured":"Huang, G.B., Mattar, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In: Workshop on Faces in real-Life\u2019Images: Detection, Alignment, and Recognition (2008)"},{"key":"1332_CR90","unstructured":"Everingham, M., Van\u00a0Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http:\/\/www.pascal-network.org\/challenges\/VOC\/voc2012\/workshop\/index.html"},{"key":"1332_CR91","first-page":"31697","volume":"35","author":"J Zhou","year":"2022","unstructured":"Zhou, J., You, C., Li, X., Liu, K., Liu, S., Qu, Q., Zhu, Z.: Are all losses created equal: a neural collapse perspective. Adv. Neural Inform. Process. Syst. 35, 31697\u201331710 (2022)","journal-title":"Adv. Neural Inform. Process. Syst."},{"issue":"6","key":"1332_CR92","doi-asserted-by":"crossref","first-page":"2147","DOI":"10.1007\/s10994-021-06115-2","volume":"111","author":"T Gneiting","year":"2022","unstructured":"Gneiting, T., Vogel, P.: Receiver operating characteristic (ROC) curves: equivalences, beta model, and minimum distance estimation. Mach. Learn. 111(6), 2147\u20132159 (2022)","journal-title":"Mach. Learn."},{"issue":"11","key":"1332_CR93","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inform. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1332_CR94","unstructured":"Boehm, B.: Stegexpose-a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014)"},{"key":"1332_CR95","doi-asserted-by":"crossref","unstructured":"Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security, pp. 48\u201353 (2014). IEEE","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"3","key":"1332_CR96","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inform. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1332_CR97","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2022.3227401","author":"KN Singh","year":"2022","unstructured":"Singh, K.N., Baranwal, N., Singh, O.P., Singh, A.K.: SIELNet: 3D chaotic-map-based secure image encryption using customized residual dense spatial network. IEEE Trans. Consumer Electron. (2022). https:\/\/doi.org\/10.1109\/TCE.2022.3227401","journal-title":"IEEE Trans. Consumer Electron."},{"key":"1332_CR98","doi-asserted-by":"publisher","unstructured":"Singh, O.P., Singh, K.N., Baranwal, N., Agrawal, A.K., Singh, A.K., Zhou, H.: HIDEmarks: hiding multiple marks for robust medical data sharing using IWT-LSB. Multimedia Tools and Applications, 1\u201319 (2023). https:\/\/doi.org\/10.1007\/s11042-023-16446-y","DOI":"10.1007\/s11042-023-16446-y"},{"key":"1332_CR99","doi-asserted-by":"publisher","unstructured":"Mahto, D., Singh, A., Singh, K., Singh, O., Agrawal, A.: Robust copyright protection technique with high-embedding capacity for color images. ACM Transactions on Multimedia Computing, Communications and Applications (2023). https:\/\/doi.org\/10.1145\/3580502","DOI":"10.1145\/3580502"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01332-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01332-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01332-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:12:42Z","timestamp":1720199562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01332-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":99,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1332"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01332-w","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,22]]},"assertion":[{"value":"7 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"129"}}