{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T12:39:25Z","timestamp":1770467965318,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:00:00Z","timestamp":1698192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11760-023-02819-1","type":"journal-article","created":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T20:34:36Z","timestamp":1698266076000},"page":"1007-1013","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Audio steganography cover enhancement via reinforcement learning"],"prefix":"10.1007","volume":"18","author":[{"given":"Peiwen","family":"Zhuo","sequence":"first","affiliation":[]},{"given":"Diqun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Kaiyu","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,25]]},"reference":[{"issue":"8","key":"2819_CR1","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W Tang","year":"2019","unstructured":"Tang, W., Li, B., Tan, S., Barni, M., Huang, J.: CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur. 14(8), 2074\u20132087 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891237","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR2","doi-asserted-by":"crossref","unstructured":"Bernard, S., Pevn\u1ef3, T., Bas, P., Klein, J.: Exploiting adversarial embeddings for better steganography. In: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp. 216\u2013 221 ( 2019)","DOI":"10.1145\/3335203.3335737"},{"key":"2819_CR3","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIFS.2019.2963764","volume":"15","author":"J Wu","year":"2020","unstructured":"Wu, J., Chen, B., Luo, W., Fang, Y.: Audio steganography based on iterative adversarial attacks against convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 15, 2282\u20132294 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2963764","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR4","unstructured":"Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. Adv. Neural Inf. Proc. Syst. 30 (2017)"},{"key":"2819_CR5","doi-asserted-by":"crossref","unstructured":"Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: Ssgan: secure steganography based on generative adversarial networks. In: Pacific Rim conference on multimedia, Springer, pp. 534\u2013 544 ( 2017)","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"2819_CR6","doi-asserted-by":"publisher","unstructured":"Volkhonskiy, D., Nazarov, I., Burnaev, E.: Steganographic generative adversarial networks. In: Osten, W., Nikolaev, D.P. (eds.) Twelfth international conference on machine vision (ICMV 2019), vol. 11433. https:\/\/doi.org\/10.1117\/12.2559429 . International Society for Optics and Photonics. https:\/\/doi.org\/10.1117\/12.2559429","DOI":"10.1117\/12.2559429"},{"issue":"10","key":"2819_CR7","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547\u20131551 (2017). https:\/\/doi.org\/10.1109\/LSP.2017.2745572","journal-title":"IEEE Signal Process. Lett."},{"key":"2819_CR8","doi-asserted-by":"crossref","unstructured":"Yang, J., Ruan, D., Kang, X., Shi, Y.-Q.: Towards automatic embedding cost learning for jpeg steganography. In: Proceedings of the ACM workshop on information hiding and multimedia security. IH &MMSec\u201919, pp. 37\u2013 46. Association for Computing Machinery, New York, NY, USA ( 2019)","DOI":"10.1145\/3335203.3335713"},{"key":"2819_CR9","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/TIFS.2019.2922229","volume":"15","author":"J Yang","year":"2020","unstructured":"Yang, J., Ruan, D., Huang, J., Kang, X., Shi, Y.-Q.: An embedding cost learning framework using GAN. IEEE Trans. Inf. Forensics Secur. 15, 839\u2013851 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2922229","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR10","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/TIFS.2023.3244094","volume":"18","author":"X Mo","year":"2023","unstructured":"Mo, X., Tan, S., Tang, W., Li, B., Huang, J.: Reload: using reinforcement learning to optimize asymmetric distortion for additive steganography. IEEE Trans. Inf. Forensics Secur. 18, 1524\u20131538 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3244094","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR11","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","volume":"16","author":"W Tang","year":"2021","unstructured":"Tang, W., Li, B., Barni, M., Li, J., Huang, J.: An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Trans. Inf. Forensics Secur. 16, 952\u2013967 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3025438","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR12","doi-asserted-by":"publisher","unstructured":"Fran\u00e7ois-Lavet, V., Henderson, P., Islam, R., Bellemare, M.G., Pineau, J.: An introduction to deep reinforcement learning. Found. Trends\u00ae Mach. Learn. 11(3\u20134), 219\u2013354 (2018). https:\/\/doi.org\/10.1561\/2200000071","DOI":"10.1561\/2200000071"},{"key":"2819_CR13","doi-asserted-by":"publisher","first-page":"61754","DOI":"10.1109\/ACCESS.2020.2983869","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Wang, R., Yan, D., Dong, L., Lin, Y.: Selecting optimal submatrix for syndrome-trellis codes (STCS)-based steganography with segmentation. IEEE Access 8, 61754\u201361766 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2983869","journal-title":"IEEE Access"},{"key":"2819_CR14","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-58574-7_41","volume-title":"Computer Vision - ECCV 2020","author":"C Yang","year":"2020","unstructured":"Yang, C., Kortylewski, A., Xie, C., Cao, Y., Yuille, A.: Patchattack: a black-box texture-based attack with reinforcement learning. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) Computer Vision - ECCV 2020, pp. 681\u2013698. Springer, Cham (2020)"},{"key":"2819_CR15","doi-asserted-by":"crossref","unstructured":"Chen, B., Luo, W., Li, H.: Audio steganalysis with convolutional neural network. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security, pp. 85\u2013 90 ( 2017)","DOI":"10.1145\/3082031.3083234"},{"key":"2819_CR16","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TIFS.2019.2963764","volume":"15","author":"J Wu","year":"2020","unstructured":"Wu, J., Chen, B., Luo, W., Fang, Y.: Audio steganography based on iterative adversarial attacks against convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 15, 2282\u20132294 (2020). https:\/\/doi.org\/10.1109\/TIFS.2019.2963764","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2819_CR17","doi-asserted-by":"crossref","unstructured":"Lin, Y., Wang, R., Yan, D., Dong, L., Zhang, X.: Audio steganalysis with improved convolutional neural network. In: Proceedings of the ACM workshop on information hiding and multimedia security, pp. 210\u2013 215 ( 2019)","DOI":"10.1145\/3335203.3335736"},{"key":"2819_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yi, X., Zhao, X.: Improving audio steganalysis using deep residual networks. In: Digital forensics and watermarking: 18th international workshop, IWDW 2019, Chengdu, China, Accessed 2\u20134 Nov 2019, Revised Selected Papers 18, Springer, pp. 57\u2013 70 ( 2020)","DOI":"10.1007\/978-3-030-43575-2_5"},{"key":"2819_CR19","doi-asserted-by":"crossref","unstructured":"Garofolo, J.S., Lamel, L.F., Fisher, W.M., Fiscus, J.G., Dahlgren, N.L.: The DARPA TIMIT acoustic-phonetic continuous speech corpus CDROM. Linguistic Data Consortium, 1993 (1993)","DOI":"10.6028\/NIST.IR.4930"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02819-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02819-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02819-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:03:37Z","timestamp":1708412617000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02819-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,25]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["2819"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02819-1","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,25]]},"assertion":[{"value":"15 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}