{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T09:32:09Z","timestamp":1749115929082,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["U19B2022, 61772349, 61872244, 62072313, 61806131, 61802262"],"award-info":[{"award-number":["U19B2022, 61772349, 61872244, 62072313, 61806131, 61802262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["(2019B151502001"],"award-info":[{"award-number":["(2019B151502001"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100017622","name":"Shenzhen R&D Program","doi-asserted-by":"crossref","award":["JCYJ20200109105008228, 20200813110043002"],"award-info":[{"award-number":["JCYJ20200109105008228, 20200813110043002"]}],"id":[{"id":"10.13039\/501100017622","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13581-w","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T10:02:40Z","timestamp":1659952960000},"page":"6687-6706","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Binary steganography based on generative adversarial nets"],"prefix":"10.1007","volume":"82","author":[{"given":"Yucheng","family":"Guan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-3691","authenticated-orcid":false,"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Qifen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"13581_CR1","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur, pp 1\u20131"},{"issue":"3","key":"13581_CR2","first-page":"27","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"AUG","key":"13581_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jvcir.2018.06.004","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Fang Y, Liu X, Yeung Y, Xue Y (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55(AUG):149\u2013156","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"13581_CR4","first-page":"201","volume":"55","author":"J Chen","year":"2018","unstructured":"Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C et al (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Contin 55(2):201\u2013211","journal-title":"Comput Mater Contin"},{"key":"13581_CR5","doi-asserted-by":"crossref","unstructured":"Chiew KL, Pieprzyk J (2010) Binary image steganographic techniques classification based on multi-class steganalysis. Information Security, Practice and Experience. Springer, Berlin, pp 341\u2013358","DOI":"10.1007\/978-3-642-12827-1_25"},{"key":"13581_CR6","doi-asserted-by":"crossref","unstructured":"Chiew KL, Pieprzyk J (2010) Blind steganalysis: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 653\u2013658","DOI":"10.1109\/ARES.2010.66"},{"key":"13581_CR7","doi-asserted-by":"crossref","unstructured":"Chiew KL, Pieprzyk J (2010) Estimating hidden message length in binary image embedded by using boundary pixels steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 683\u2013688","DOI":"10.1109\/ARES.2010.65"},{"issue":"2","key":"13581_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TIFS.2014.2368364","volume":"10","author":"B Feng","year":"2014","unstructured":"Feng B, Lu W, Sun W (2014) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Trans Inform Forensics Secur 10(2):243\u2013255","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"jul","key":"13581_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.jvcir.2017.01.008","volume":"46","author":"B Feng","year":"2017","unstructured":"Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46(jul):119\u2013127","journal-title":"J Vis Commun Image Represent"},{"key":"13581_CR10","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2014) Generative adversarial nets. In Advances in neural information processing systems, pp 2672\u20132680"},{"key":"13581_CR11","first-page":"2672","volume":"3","author":"IJ Goodfellow","year":"2014","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M et al (2014) Generative adversarial networks. Adv Neural Inf Process Syst 3:2672\u20132680","journal-title":"Adv Neural Inf Process Syst"},{"key":"13581_CR12","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition. IEEE Conference on Computer Vision & Pattern Recognition. IEEE Computer Society","DOI":"10.1109\/CVPR.2016.90"},{"key":"13581_CR13","unstructured":"Jetchev N, Bergmann U, Vollgraf R (2016) Texture synthesis with spatial generative adversarial networks.\u00a0arXiv preprint arXiv:1611.08207"},{"issue":"OCT","key":"13581_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","volume":"163","author":"Y Jia","year":"2019","unstructured":"Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163(OCT):238\u2013246","journal-title":"Sig Process"},{"key":"13581_CR15","doi-asserted-by":"crossref","unstructured":"Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. International Workshop on Information Hiding. Springer, Berlin, pp 314\u2013327","DOI":"10.1007\/978-3-540-74124-4_21"},{"key":"13581_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/5037892","volume":"2018","author":"H Li Ming, Fan","year":"2018","unstructured":"Li Ming, Fan H, Hua R, Lu D, Xiao D, Li Y (2018) Meaningful image encryption based on reversible data hiding in compressive sensing domain. Secur Commun Netw 2018:1\u201312","journal-title":"Secur Commun Netw"},{"key":"13581_CR17","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2016","unstructured":"Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"key":"13581_CR18","doi-asserted-by":"publisher","first-page":"30081","DOI":"10.1007\/s11042-018-6922-4","volume":"78","author":"C Lin","year":"2018","unstructured":"Lin C, Lu W, Huang X (2018) Copy-move forgery detection using combined features and transitive matching. Multimed Tools Appl 78:30081\u201330096","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"13581_CR19","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-019-7342-9","volume":"78","author":"C Lin","year":"2019","unstructured":"Lin C, Lu W, Huang X et al (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimed Tools Appl 78(15):20739\u201320763","journal-title":"Multimed Tools Appl"},{"key":"13581_CR20","doi-asserted-by":"crossref","unstructured":"Liu J, Lu W, Zhan Y, Chen J, Li R (2019) Efficient binary image steganalysis based on ensemble neural network of multi-module. J Real-Time Image Process","DOI":"10.1007\/s11554-019-00885-8"},{"key":"13581_CR21","doi-asserted-by":"crossref","unstructured":"Liu W, Yin X, Lu W, Zhang J, Zeng J, Shi S,\u00a0Mao M (2019) Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process 167:107287","DOI":"10.1016\/j.sigpro.2019.107287"},{"issue":"7","key":"13581_CR22","doi-asserted-by":"publisher","first-page":"7947","DOI":"10.1007\/s11042-018-6411-9","volume":"78","author":"X Liu","year":"2019","unstructured":"Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2019) Scaling factor estimation on JPEG compressed images by cyclostationarity analysis. Multimed Tools Appl 78(7):7947\u20137964","journal-title":"Multimed Tools Appl"},{"key":"13581_CR23","unstructured":"Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-JPEG compressed images. IEEE Trans Circuits Syst Video Technol, pp 1\u20131"},{"key":"13581_CR24","doi-asserted-by":"crossref","unstructured":"Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circuits Syst Video Technol (6):1\u20131","DOI":"10.1109\/TCSVT.2018.2852702"},{"key":"13581_CR25","doi-asserted-by":"crossref","unstructured":"Lu W, Li R, Zeng L, Chen J, Huang J, Shi Y (2019) Binary image steganalysis based on histogram of structuring elements. IEEE Trans Circuits Syst Video Technol","DOI":"10.1109\/TCSVT.2019.2936028"},{"issue":"1","key":"13581_CR26","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inform Forensics Secur 5(1):187\u2013193","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"21","key":"13581_CR27","doi-asserted-by":"publisher","first-page":"13557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"X Luo","year":"2016","unstructured":"Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557\u201313583","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"13581_CR28","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"Y Ma","year":"2019","unstructured":"Ma Y, Luo X, Li X, Bao Z, Zhang Y (2019) Selection of rich model steganalysis features based on decision rough set \u03b1 -positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336\u2013350","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"13581_CR29","first-page":"1938","volume":"9","author":"K Mhammad","year":"2015","unstructured":"Mhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938\u20131962","journal-title":"TIIS"},{"issue":"5","key":"13581_CR30","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10916-016-0473-x","volume":"40","author":"K Mhammad","year":"2016","unstructured":"Mhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):114","journal-title":"J Med Syst"},{"issue":"6","key":"13581_CR31","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597\u20138626","journal-title":"Multimed Tools Appl"},{"key":"13581_CR32","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2016.11.029","volume":"86","author":"K Muhammad","year":"2018","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951\u2013960","journal-title":"Futur Gener Comput Syst"},{"issue":"14","key":"13581_CR33","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-018-5720-3","volume":"77","author":"N Mukherjee","year":"2018","unstructured":"Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security[J]. Multimed Tools Appl 77(14):18451\u201318481","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"13581_CR34","first-page":"1","volume":"76","author":"G Paul","year":"2016","unstructured":"Paul G, Davidson I, Mukherjee I (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):1\u201327","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"13581_CR35","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimed 16(5):1486\u20131491","journal-title":"IEEE Trans Multimed"},{"key":"13581_CR36","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks.arXiv preprintarXiv:1511.06434"},{"issue":"6","key":"13581_CR37","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1049\/iet-ipr.2017.0965","volume":"12","author":"VK Sharma","year":"2018","unstructured":"Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Proc 12(6):1065\u20131071","journal-title":"IET Image Proc"},{"key":"13581_CR38","doi-asserted-by":"crossref","unstructured":"Tang W, Tan S, Tan S, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547\u20131551","DOI":"10.1109\/LSP.2017.2745572"},{"key":"13581_CR39","volume-title":"Pattern Recognition","author":"S Theodoridis","year":"2009","unstructured":"Theodoridis S, Koutroumbas K (2009) Pattern Recognition, 4th edn. Elsevier, Amsterdam","edition":"4"},{"key":"13581_CR40","doi-asserted-by":"crossref","unstructured":"Tuceryan M, Jain AK (1993) Texture analysis. Handbook of pattern recognition and computer vision, vol 2, pp 207\u2013248","DOI":"10.1142\/9789812384737_0007"},{"issue":"FEB","key":"13581_CR41","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jvcir.2018.12.048","volume":"59","author":"H Xiao","year":"2019","unstructured":"Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J (2019) Defocus blur detection based on multiscale SVD fusion in gradient domain. J Vis Commun Image Represent 59(FEB):52\u201361","journal-title":"J Vis Commun Image Represent"},{"key":"13581_CR42","doi-asserted-by":"crossref","unstructured":"Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Process Lett 23(5):708\u2013712","DOI":"10.1109\/LSP.2016.2548421"},{"key":"13581_CR43","first-page":"1","volume":"3","author":"F Xue","year":"2020","unstructured":"Xue F, Lu W, Ren H, Liu X (2020) Forensics of visual privacy protection in digital images. Multimed Tools Appl 3:1\u201319","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"13581_CR44","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s11554-018-0822-8","volume":"16","author":"Y Xue","year":"2019","unstructured":"Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2019) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc 16(3):601\u2013609","journal-title":"J Real-Time Image Proc"},{"key":"13581_CR45","doi-asserted-by":"crossref","unstructured":"Yang S, Jiang L, Liu Z, Loy CC (2022) Unsupervised image-to-image translation with generative prior. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 18332\u201318341","DOI":"10.1109\/CVPR52688.2022.01779"},{"key":"13581_CR46","doi-asserted-by":"crossref","unstructured":"Yeung Y, Lu W, Xue Y, Huang J, Shi YQ (2020) Secure binary image steganography with distortion measurement based on prediction. IEEE Trans Circuits Syst Video Technol 30(5):1423\u20131434","DOI":"10.1109\/TCSVT.2019.2903432"},{"key":"13581_CR47","doi-asserted-by":"crossref","unstructured":"Zeng L, Lu W, Liu W, Chen J (2020) Deep residual network for halftone image steganalysis with stego-signal diffusion. Signal Process 172(Jul.):107576.1-107576.9","DOI":"10.1016\/j.sigpro.2020.107576"},{"issue":"20","key":"13581_CR48","doi-asserted-by":"publisher","first-page":"26239","DOI":"10.1007\/s11042-018-5847-2","volume":"77","author":"F Zhang","year":"2018","unstructured":"Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0 regularization and kernel shape optimization. Multimed Tools Appl 77(20):26239\u201326257","journal-title":"Multimed Tools Appl"},{"key":"13581_CR49","doi-asserted-by":"publisher","first-page":"21891","DOI":"10.1007\/s11042-019-7519-2","volume":"78","author":"F Zhang","year":"2019","unstructured":"Zhang F, Lu W, Liu H, Yeung Y, Xue Y (2019) Reversible data hiding in binary images based on image magnification. Multimed Tools Appl 78:21891\u201321915","journal-title":"Multimed Tools Appl"},{"key":"13581_CR50","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.jvcir.2018.12.038","volume":"58","author":"J Zhang","year":"2019","unstructured":"Zhang J, Lu W, Yin X (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600\u2013605","journal-title":"J Vis Commun Image Represent"},{"issue":"23","key":"13581_CR51","doi-asserted-by":"publisher","first-page":"31239","DOI":"10.1007\/s11042-018-6230-z","volume":"77","author":"Q Zhang","year":"2018","unstructured":"Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl 77(23):31239\u201331260","journal-title":"Multimed Tools Appl"},{"key":"13581_CR52","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jvcir.2016.07.013","volume":"40","author":"Q Zhang","year":"2016","unstructured":"Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449\u2013458","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"13581_CR53","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485\u2013495","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13581-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13581-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13581-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T08:13:03Z","timestamp":1674720783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13581-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13581"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13581-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"24 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}