{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:30:38Z","timestamp":1772101838490,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2026"],"award-info":[{"award-number":["U22B2026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00530-024-01427-4","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T07:46:41Z","timestamp":1722239201000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["GAN-based image steganography by exploiting transform domain knowledge with deep networks"],"prefix":"10.1007","volume":"30","author":[{"given":"Xiao","family":"Li","sequence":"first","affiliation":[]},{"given":"Liquan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianchang","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Suhui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"1427_CR1","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","volume":"609","author":"C Mandal","year":"2022","unstructured":"Mandal, C., Mukherjee, I., Paul, G., Chatterji, B.N.: Digital image steganography: a literature survey. Inform. Sci. 609, 1451\u20131488 (2022)","journal-title":"Inform. Sci."},{"key":"1427_CR2","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299\u2013326 (2019)","journal-title":"Neurocomputing"},{"issue":"20","key":"1427_CR3","doi-asserted-by":"publisher","first-page":"30367","DOI":"10.1007\/s11042-020-09606-x","volume":"80","author":"OP Singh","year":"2021","unstructured":"Singh, O.P., Singh, A.K., Srivastava, G., Kumar, N.: Image watermarking using soft computing techniques: a comprehensive survey. Multimed. Tools Appl. 80(20), 30367\u201330398 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"1427_CR4","doi-asserted-by":"publisher","first-page":"24919","DOI":"10.1007\/s11042-023-16446-y","volume":"83","author":"OP Singh","year":"2024","unstructured":"Singh, O.P., Singh, K.N., Baranwal, N., Agrawal, A.K., Singh, A.K., Zhou, H.: Hidemarks: hiding multiple marks for robust medical data sharing using IWT-LSB. Multimed. Tools Appl. 83(8), 24919\u201324937 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"10","key":"1427_CR5","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"1427_CR6","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/TIFS.2019.2922229","volume":"15","author":"J Yang","year":"2019","unstructured":"Yang, J., Ruan, D., Huang, J., Kang, X., Shi, Y.-Q.: An embedding cost learning framework using GAN. IEEE Trans. Inform. Forensics Secur. 15, 839\u2013851 (2019)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"18","key":"1427_CR7","doi-asserted-by":"publisher","first-page":"16073","DOI":"10.1007\/s00521-022-07270-w","volume":"34","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Wang, S.: A stable GAN for image steganography with multi-order feature fusion. Neural Comput. Appl. 34(18), 16073\u201316088 (2022)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"1427_CR8","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inform. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1427_CR9","doi-asserted-by":"crossref","unstructured":"Pevn\u00fd, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. Paper presented at the 12th international conference on information hiding (2010)","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"1427_CR10","doi-asserted-by":"crossref","unstructured":"Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. Paper presented at the 2012 IEEE international workshop on information forensics and security (WIFS) (2012)","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"1427_CR11","unstructured":"Zhang, K.A., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: SteganoGAN: High capacity image steganography with GANs. Preprint at http:\/\/arxiv.org\/abs\/1901.03892 (2019)"},{"issue":"2","key":"1427_CR12","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2022","unstructured":"Tan, J., Liao, X., Liu, J., Cao, Y., Jiang, H.: Channel attention image steganography with generative adversarial networks. IEEE Trans. Netw. Sci. Eng. 9(2), 888\u2013903 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"1427_CR13","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. Paper presented at the European conference on computer vision (ECCV) (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"1427_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17113-y","author":"F Ernawan","year":"2023","unstructured":"Ernawan, F.: An improved hiding information by modifying selected DWT coefficients in video steganography. Multimed. Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-17113-y","journal-title":"Multimed. Tools Appl."},{"key":"1427_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2022.104212","volume":"80","author":"K Sashi Rekha","year":"2023","unstructured":"Sashi Rekha, K., Joe Amali, M., Swathy, M., Raghini, M., Priya Darshini, B.: A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm. Biomed. Signal Process. Control 80, 104212 (2023)","journal-title":"Biomed. Signal Process. Control"},{"key":"1427_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107571","volume":"173","author":"L Xiong","year":"2020","unstructured":"Xiong, L., Zhong, X., Yang, C.-N.: DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process. 173, 107571 (2020)","journal-title":"Signal Process."},{"issue":"5","key":"1427_CR17","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/18.57199","volume":"36","author":"I Daubechies","year":"1990","unstructured":"Daubechies, I.: The wavelet transform, time-frequency localization and signal analysis. IEEE Trans. Inform. Theor. 36(5), 961\u20131005 (1990)","journal-title":"IEEE Trans. Inform. Theor."},{"issue":"7","key":"1427_CR18","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat, S.G.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674\u2013693 (1989)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"1427_CR19","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2023","unstructured":"Chan, C.-K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469\u2013474 (2023)","journal-title":"Pattern Recognit."},{"issue":"1","key":"1427_CR20","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s00530-020-00703-3","volume":"27","author":"SK Ghosal","year":"2021","unstructured":"Ghosal, S.K., Chatterjee, A., Sarkar, R.: image steganography based on Kirsch edge detection. Multimed. Syst. 27(1), 73\u201387 (2021)","journal-title":"Multimed. Syst."},{"issue":"8","key":"1427_CR21","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1109\/TCSVT.2019.2915584","volume":"30","author":"J Wang","year":"2019","unstructured":"Wang, J., Chen, X., Ni, J., Mao, N., Shi, Y.: Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2313\u20132328 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1427_CR22","doi-asserted-by":"crossref","unstructured":"Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. Paper presented at the 2014 IEEE international workshop on information forensics and security (WIFS) (2014)","DOI":"10.1109\/WIFS.2014.7084302"},{"issue":"4","key":"1427_CR23","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIFS.2010.2077629","volume":"5","author":"T Filler","year":"2010","unstructured":"Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inform. Forensics Secur. 5(4), 705\u2013720 (2010)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"1427_CR24","unstructured":"Volkhonskiy, D., Borisenko, B., Burnaev, E.: Generative adversarial networks for image steganography. Paper presented at the 5th international conference on learning representations (ICLR) (2017)"},{"key":"1427_CR25","doi-asserted-by":"crossref","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. Paper presented at the advances in multimedia information processing\u2013PCM 2017 (2018)","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"1427_CR26","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der\u00a0Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. Paper presented at the IEEE conference on computer vision and pattern recognition (CVPR) (2017)","DOI":"10.1109\/CVPR.2017.243"},{"key":"1427_CR27","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Paper presented at the advances in neural information processing systems (NeurlPS) (2017)"},{"issue":"6","key":"1427_CR28","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/fi10060054","volume":"10","author":"P Wu","year":"2018","unstructured":"Wu, P., Yang, Y., Li, X.: Stegnet: mega image steganography capacity with deep convolutional network. Fut. Internet 10(6), 54 (2018)","journal-title":"Fut. Internet"},{"issue":"7","key":"1427_CR29","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Dong, S., Liu, J.: Invisible steganography via generative adversarial networks. Multimed. Tools Appl. 78(7), 8559\u20138575 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"1427_CR30","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. Paper presented at the IEEE\/CVF international conference on computer vision (ICCV) (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"1427_CR31","doi-asserted-by":"crossref","unstructured":"Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. Paper presented at the IEEE\/CVF conference on computer vision and pattern recognition (CVPR) (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"1427_CR32","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. Paper presented at the 34th international conference on machine learning (ICML) (2017)"},{"key":"1427_CR33","doi-asserted-by":"crossref","unstructured":"Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. Paper presented at the 2014 IEEE international conference on image processing (ICIP) (2014)","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"1427_CR34","doi-asserted-by":"crossref","unstructured":"Bas, P., Filler, T., Pevn\u1ef3, T.: Break our steganographic system: the ins and outs of organizing BOSS. Paper presented at the international workshop on information hiding (2011)","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"1427_CR35","unstructured":"Boehm, B.: StegExpose\u2014a tool for detecting LSB steganography. Preprint at arXiv:abs\/1410.6656 (2014)"},{"issue":"4","key":"1427_CR36","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"1427_CR37","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TCSVT.2021.3115600","volume":"32","author":"W Tang","year":"2021","unstructured":"Tang, W., Li, B., Barni, M., Li, J., Huang, J.: Improving cost learning for jpeg steganography by exploiting jpeg domain knowledge. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4081\u20134095 (2021)","journal-title":"IEEE Trans. Circuits Syst.Video Technol."},{"key":"1427_CR38","unstructured":"Kishore, V., Chen, X., Wang, Y., Li, B., Weinberger, K.Q.: Fixed neural network steganography: train the images, not the network. Paper presented at the international conference on learning representations (ICLR) (2022)"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01427-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01427-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01427-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T08:37:24Z","timestamp":1724315844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01427-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1427"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01427-4","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,29]]},"assertion":[{"value":"15 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors have no Conflict of interest or personal relationships to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"224"}}