{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:52:17Z","timestamp":1761648737409},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T00:00:00Z","timestamp":1580169600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T00:00:00Z","timestamp":1580169600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-020-00947-2","type":"journal-article","created":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T06:04:39Z","timestamp":1580191479000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Introduction to the special issue on deep learning for real-time information hiding and forensics"],"prefix":"10.1007","volume":"17","author":[{"given":"Zhili","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ching-Nung","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Cheonshik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Stelvio","family":"Cimato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,28]]},"reference":[{"key":"947_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00929-z","author":"J Wang","year":"2019","unstructured":"Wang, J., Huang, W., Luo, X., Shi, Y.-Q., Jha, S.K.: Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00929-z","journal-title":"J. Real Time Image Process."},{"key":"947_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00907-5","author":"F Ding","year":"2019","unstructured":"Ding, F., Shi, Y., Zhu, G., Shi, Y.: Real-time estimation for the parameters of Gaussian filtering via deep learning. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00907-5","journal-title":"J. Real Time Image Process."},{"key":"947_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00893-8","author":"B Yang","year":"2019","unstructured":"Yang, B., Li, Z., Zhang, T.: A real-time image forensics scheme based on multi-domain learning. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00893-8","journal-title":"J. Real Time Image Process."},{"key":"947_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00904-8","author":"H Yao","year":"2019","unstructured":"Yao, H., Wei, H., Qin, C., Tang, Z.: A real-time reversible image authentication method using uniform embedding strategy. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00904-8","journal-title":"J. Real Time Image Process."},{"key":"947_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00928-0","author":"C Yuan","year":"2019","unstructured":"Yuan, C., Chen, X., Yu, P., Meng, R., Cheng, W., Jonathan Wu, Q.M., Sun, X.: Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00928-0","journal-title":"J. Real Time Image Process."},{"key":"947_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/10.1007\/s11554-019-00908-4","author":"S Wang","year":"2019","unstructured":"Wang, S., Xin, X., Liu, L., Tian, J.: Multi-level feature fusion model based real-time person re-identification for forensics. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/10.1007\/s11554-019-00908-4","journal-title":"J. Real Time Image Process."},{"key":"947_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00903-9","author":"Q Tian","year":"2019","unstructured":"Tian, Q., Zhang, W., Mao, J., Yin, H.: Real-time human cross-race aging-related face appearance detection with deep convolution architecture. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00903-9","journal-title":"J. Real Time Image Process."},{"key":"947_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00899-2","author":"L Zhao","year":"2019","unstructured":"Zhao, L., Chen, Y., Sheng, V.S.: A real-time typhoon eye detection method based on deep learning for meteorological information forensics. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00899-2","journal-title":"J. Real Time Image Process."},{"key":"947_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00930-6","author":"L Guo","year":"2019","unstructured":"Guo, L., Qianqiong, W., Liu, S., Duan, M., Li, H., Sun, J.: Deep learning-based real-time VPN encrypted traffic identification methods. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00930-6","journal-title":"J. Real Time Image Process."},{"key":"947_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00905-7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Luo, X., Zhu, X., Li, Z., Bors, A.G.: Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00905-7","journal-title":"J. Real Time Image Process."},{"key":"947_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Zhili Zhou","year":"2015","unstructured":"Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Int. Conf. Cloud Comput. Security, pp. 123\u2013132 (2015)"},{"issue":"13","key":"947_CR12","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Mu, Y., Jonathan Wu, Q.M.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23(13), 4927\u20134938 (2019)","journal-title":"Soft Comput."},{"key":"947_CR13","doi-asserted-by":"publisher","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","volume":"7","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Cao, Y., Wang, M., Fan, E., Jonathan Wu, Q.M.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access. 7, 179891\u2013179897 (2019)","journal-title":"IEEE Access."},{"key":"947_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00917-3","author":"Y Luo","year":"2019","unstructured":"Luo, Y., Qin, J., Xiang, X., Tan, Y., Liu, Q., Xiang, L.: Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00917-3","journal-title":"J. Real Time Image Process."},{"key":"947_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00885-8","author":"J Liu","year":"2019","unstructured":"Liu, J., Wei, L., Zhan, Y., Chen, J., Zhaopeng, X., Li, R.: Efficient binary image steganalysis based on ensemble neural network of multi-module. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00885-8","journal-title":"J. Real Time Image Process."},{"key":"947_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00915-5","author":"F Ruan","year":"2019","unstructured":"Ruan, F., Zhang, X., Zhu, D., Zhanyang, X., Wan, S., Qi, L.: Deep learning for real-time image steganalysis: a survey. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00915-5","journal-title":"J. Real Time Image Process."},{"key":"947_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00909-3","author":"Q Jiaohua","year":"2019","unstructured":"Jiaohua, Q., Jianhua, C., Xuyu, X., Yun, T., Wentao, M., Jing, W.: A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00909-3","journal-title":"J. Real Time Image Process."},{"key":"947_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00887-6","author":"D Liu","year":"2019","unstructured":"Liu, D., Shen, J., Wang, A., Wang, C.: Secure real-time image protection scheme with near-duplicate detection in cloud computing. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00887-6","journal-title":"J. Real Time Image Process."},{"key":"947_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00936-0","author":"S Bouaafia","year":"2019","unstructured":"Bouaafia, S., Khemiri, R., Sayadi, F.E., Atri, M.: Fast CU partition-based machine learning approach for reducing HEVC complexity. J. Real Time Image Process. (2019). https:\/\/doi.org\/10.1007\/s11554-019-00936-0","journal-title":"J. Real Time Image Process."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-020-00947-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-020-00947-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-020-00947-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:14:53Z","timestamp":1611706493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-020-00947-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,28]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["947"],"URL":"https:\/\/doi.org\/10.1007\/s11554-020-00947-2","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,28]]},"assertion":[{"value":"28 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}