{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:20:01Z","timestamp":1773192001215,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the General Program of the National Natural Science Foundation of China","award":["62272478"],"award-info":[{"award-number":["62272478"]}]},{"name":"Science and Technology Innovation Team Innovative Research Project","award":["ZZKY2022102"],"award-info":[{"award-number":["ZZKY2022102"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102450"],"award-info":[{"award-number":["62102450"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s00530-024-01476-9","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:03:40Z","timestamp":1725948220000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Implicit neural representation steganography by neuron pruning"],"prefix":"10.1007","volume":"30","author":[{"given":"Weina","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lifeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenquan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiaozhong","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,10]]},"reference":[{"key":"1476_CR1","first-page":"715","volume":"123","author":"K Hu","year":"2024","unstructured":"Hu, K., Wang, M., Ma, X., Chen, J., Wang, X., Wang, X.: Learning-based image steganography and watermarking: a survey. Exp. Syst. Appl. 123, 715 (2024)","journal-title":"Exp. Syst. Appl."},{"key":"1476_CR2","doi-asserted-by":"crossref","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Advances in Cryptology: Proceedings of Crypto 83, pp. 51\u201367 (1984). Springer","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"4","key":"1476_CR3","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474\u2013481 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1476_CR4","unstructured":"Boehm, B.: Stegexpose-a tool for detecting lsb steganography. arXiv preprint arXiv:1410.6656 (2014)"},{"key":"1476_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","volume":"16","author":"W You","year":"2020","unstructured":"You, W., Zhang, H., Zhao, X.: A siamese cnn for image steganalysis. IEEE Trans. Inf. Forensics Secur. 16, 291\u2013306 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1476_CR6","first-page":"78","volume":"30","author":"S Baluja","year":"2017","unstructured":"Baluja, S.: Hiding images in plain sight: deep steganography. Adv. Neural Inf. Process. Syst. 30, 78 (2017)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"1476_CR7","doi-asserted-by":"crossref","unstructured":"Wei, P., Li, S., Zhang, X., Luo, G., Qian, Z., Zhou, Q.: Generative steganography network. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 1621\u20131629 (2022)","DOI":"10.1145\/3503161.3548217"},{"key":"1476_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119250","volume":"643","author":"Z Yang","year":"2023","unstructured":"Yang, Z., Wang, Z., Zhang, X.: A general steganographic framework for neural network models. Inf. Sci. 643, 119250 (2023)","journal-title":"Inf. Sci."},{"key":"1476_CR9","first-page":"7462","volume":"33","author":"V Sitzmann","year":"2020","unstructured":"Sitzmann, V., Martel, J., Bergman, A., Lindell, D., Wetzstein, G.: Implicit neural representations with periodic activation functions. Adv. Neural. Inf. Process. Syst. 33, 7462\u20137473 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1476_CR10","doi-asserted-by":"crossref","unstructured":"Lee, S., Jeong, J.-B., Ryu, E.-S.: Entropy-constrained implicit neural representations for deep image compression. IEEE Signal Process. Lett. (2023)","DOI":"10.1109\/LSP.2023.3279780"},{"issue":"19","key":"1476_CR11","doi-asserted-by":"publisher","first-page":"22615","DOI":"10.1007\/s10489-023-04714-1","volume":"53","author":"D Zhu","year":"2023","unstructured":"Zhu, D., Shao, X., Zhang, K., Min, X., Zhai, G., Yang, X.: Audio-visual aligned saliency model for omnidirectional video with implicit neural representation learning. Appl. Intell. 53(19), 22615\u201322634 (2023)","journal-title":"Appl. Intell."},{"key":"1476_CR12","doi-asserted-by":"crossref","unstructured":"Srinivasan, P.P., Deng, B., Zhang, X., Tancik, M., Mildenhall, B., Barron, J.T.: Nerv: Neural reflectance and visibility fields for relighting and view synthesis. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7495\u20137504 (2021)","DOI":"10.1109\/CVPR46437.2021.00741"},{"key":"1476_CR13","doi-asserted-by":"crossref","unstructured":"Yang, Y., Yin, F., Liu, W., Fan, J., Chen, X., Yu, G., Chen, T.: Pm-inr: Prior-rich multi-modal implicit large-scale scene neural representation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 38, pp. 6594\u20136602 (2024)","DOI":"10.1609\/aaai.v38i7.28481"},{"key":"1476_CR14","unstructured":"Liu, J., Luo, P., Ke, Y.: Hiding functions within functions: Steganography by implicit neural representations. arXiv preprint arXiv:2312.04743 (2023)"},{"key":"1476_CR15","doi-asserted-by":"crossref","unstructured":"Han, G., Lee, D.-J., Hur, J., Choi, J., Kim, J.: Deep cross-modal steganography using neural representations. In: 2023 IEEE International Conference on Image Processing (ICIP), pp. 1205\u20131209 (2023). IEEE","DOI":"10.1109\/ICIP49359.2023.10222113"},{"key":"1476_CR16","unstructured":"Yang, S., Song, S., Yoo, C.D., Kim, J.: Inrsteg: Flexible cross-modal large capacity steganography via implicit representations (2023)"},{"issue":"3","key":"1476_CR17","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"1476_CR18","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2019","unstructured":"Baluja, S.: Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1685\u20131697 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1476_CR19","unstructured":"Zhang, K.A., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: Steganogan: High capacity image steganography with gans. arXiv preprint arXiv:1901.03892 (2019)"},{"key":"1476_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657\u2013672 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"1476_CR21","doi-asserted-by":"crossref","unstructured":"Tancik, M., Mildenhall, B., Ng, R.: Stegastamp: Invisible hyperlinks in physical photographs. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2117\u20132126 (2020)","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"1476_CR22","doi-asserted-by":"crossref","unstructured":"Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: Hinet: Deep image hiding by invertible network. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4733\u20134742 (2021)","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"1476_CR23","doi-asserted-by":"crossref","unstructured":"Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10816\u201310825 (2021)","DOI":"10.1109\/CVPR46437.2021.01067"},{"issue":"1","key":"1476_CR24","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","volume":"45","author":"Z Guan","year":"2022","unstructured":"Guan, Z., Jing, J., Deng, X., Xu, M., Jiang, L., Zhang, Z., Li, Y.: Deepmih: Deep invertible network for multiple image hiding. IEEE Trans. Pattern Anal. Mach. Intell. 45(1), 372\u2013390 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"11","key":"1476_CR25","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial networks. Commun. ACM 63(11), 139\u2013144 (2020)","journal-title":"Commun. ACM"},{"key":"1476_CR26","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1476_CR27","first-page":"869","volume":"31","author":"DP Kingma","year":"2018","unstructured":"Kingma, D.P., Dhariwal, P.: Glow: Generative flow with invertible 1x1 convolutions. Adv. Neural Inf. Process. Syst. 31, 869 (2018)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"1476_CR28","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"issue":"4","key":"1476_CR29","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCI.2021.3108305","volume":"16","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Feng, G., Wu, H., Zhang, X.: Data hiding in neural networks for multiple receivers [research frontier]. IEEE Comput. Intell. Mag. 16(4), 70\u201384 (2021)","journal-title":"IEEE Comput. Intell. Mag."},{"key":"1476_CR30","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wang, Z., Zhang, X., Tang, Z.: Multi-source data hiding in neural networks. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), pp. 1\u20136 (2022). IEEE","DOI":"10.1109\/MMSP55362.2022.9948867"},{"key":"1476_CR31","doi-asserted-by":"crossref","unstructured":"Li, G., Li, S., Li, M., Zhang, X., Qian, Z.: Steganography of steganographic networks. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 5178\u20135186 (2023)","DOI":"10.1609\/aaai.v37i4.25647"},{"key":"1476_CR32","unstructured":"Li, G., Li, S., Li, M., Qian, Z., Zhang, X.: Towards deep network steganography: From networks to networks. arXiv preprint arXiv:2307.03444 (2023)"},{"key":"1476_CR33","first-page":"13304","volume":"34","author":"J Yang","year":"2021","unstructured":"Yang, J., Shen, S., Yue, H., Li, K.: Implicit transformer network for screen content image continuous super-resolution. Adv. Neural. Inf. Process. Syst. 34, 13304\u201313315 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1476_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2023.102991","volume":"91","author":"D Wiesner","year":"2024","unstructured":"Wiesner, D., Suk, J., Dummer, S., Ne\u010dasov\u00e1, T., Ulman, V., Svoboda, D., Wolterink, J.M.: Generative modeling of living cells with so (3)-equivariant implicit neural representations. Med. Image Anal. 91, 102991 (2024)","journal-title":"Med. Image Anal."},{"key":"1476_CR35","doi-asserted-by":"crossref","unstructured":"Peng, S., Zhang, Y., Xu, Y., Wang, Q., Shuai, Q., Bao, H., Zhou, X.: Neural body: Implicit neural representations with structured latent codes for novel view synthesis of dynamic humans. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9054\u20139063 (2021)","DOI":"10.1109\/CVPR46437.2021.00894"},{"key":"1476_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.107266","volume":"164","author":"J Sander","year":"2023","unstructured":"Sander, J., Vos, B.D., Bruns, S., Planken, N., Viergever, M.A., Leiner, T., I\u0161gum, I.: Reconstruction and completion of high-resolution 3d cardiac shapes using anisotropic cmri segmentations and continuous implicit neural representations. Comput. Biol. Med. 164, 107266 (2023)","journal-title":"Comput. Biol. Med."},{"issue":"1","key":"1476_CR37","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/3503250","volume":"65","author":"B Mildenhall","year":"2021","unstructured":"Mildenhall, B., Srinivasan, P.P., Tancik, M., Barron, J.T., Ramamoorthi, R., Ng, R.: Nerf: Representing scenes as neural radiance fields for view synthesis. Commun. ACM 65(1), 99\u2013106 (2021)","journal-title":"Commun. ACM"},{"key":"1476_CR38","doi-asserted-by":"crossref","unstructured":"Li, C., Feng, B.Y., Fan, Z., Pan, P., Wang, Z.: Steganerf: Embedding invisible information within neural radiance fields. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 441\u2013453 (2023)","DOI":"10.1109\/ICCV51070.2023.00047"},{"key":"1476_CR39","doi-asserted-by":"crossref","unstructured":"Luo, Z., Guo, Q., Cheung, K.C., See, S., Wan, R.: Copyrnerf: Protecting the copyright of neural radiance fields. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 22401\u201322411 (2023)","DOI":"10.1109\/ICCV51070.2023.02047"},{"key":"1476_CR40","doi-asserted-by":"crossref","unstructured":"Jang, Y., Lee, D.I., Jang, M., Kim, J.W., Yang, F., Kim, S.: Waterf: Robust watermarks in radiance fields for protection of copyrights. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12087\u201312097 (2024)","DOI":"10.1109\/CVPR52733.2024.01149"},{"key":"1476_CR41","doi-asserted-by":"crossref","unstructured":"Huang, Q., Liao, Y., Hao, Y., Zhou, P.: Noise-nerf: Hide information in neural radiance fields using trainable noise. arXiv preprint arXiv:2401.01216 (2024)","DOI":"10.1007\/978-3-031-72335-3_22"},{"issue":"3","key":"1476_CR42","doi-asserted-by":"publisher","first-page":"033031","DOI":"10.1117\/1.JEI.33.3.033031","volume":"33","author":"W Dong","year":"2024","unstructured":"Dong, W., Liu, J., Chen, L., Sun, W., Pan, X.: Stega4nerf: cover selection steganography for neural radiance fields. J. Electron. Imaging 33(3), 033031\u2013033031 (2024)","journal-title":"J. Electron. Imaging"},{"key":"1476_CR43","unstructured":"Hu, H., Peng, R., Tai, Y.-W., Tang, C.-K.: Network trimming: A data-driven neuron pruning approach towards efficient deep architectures. arXiv preprint arXiv:1607.03250 (2016)"},{"key":"1476_CR44","unstructured":"Karras, T., Aila, T., Laine, S., Lehtinen, J.: Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196 (2017)"},{"key":"1476_CR45","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Doll\u00e1r, P., Zitnick, C.L.: Microsoft coco: Common objects in context. In: Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp. 740\u2013755 (2014). Springer","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"4","key":"1476_CR46","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"1476_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586\u2013595 (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"1476_CR48","first-page":"10","volume":"4","author":"AA Tamimi","year":"2013","unstructured":"Tamimi, A.A., Abdalla, A.M., Al-Allaf, O.: Hiding an image inside another image using variable-rate steganography. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 4, 10 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"1476_CR49","doi-asserted-by":"crossref","unstructured":"Weng, X., Li, Y., Chi, L., Mu, Y.: High-capacity convolutional video steganography with temporal residual modeling. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval, pp. 87\u201395 (2019)","DOI":"10.1145\/3323873.3325011"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01476-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-024-01476-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-024-01476-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T14:12:35Z","timestamp":1730124755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-024-01476-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1476"],"URL":"https:\/\/doi.org\/10.1007\/s00530-024-01476-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4417487\/v1","asserted-by":"object"}]},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,10]]},"assertion":[{"value":"14 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"266"}}