{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T11:40:05Z","timestamp":1750333205532,"version":"3.41.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T00:00:00Z","timestamp":1749168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s40747-025-01943-4","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:56:30Z","timestamp":1749196590000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A noise-constrained lightweight high-quality image hiding method based on invertible neural networks"],"prefix":"10.1007","volume":"11","author":[{"given":"Minghui","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4408-5114","authenticated-orcid":false,"given":"Dapeng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yanyan","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Wanting","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Jinjiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"1943_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/B978-0-12-385510-7.00002-3","volume":"83","author":"GC Kessler","year":"2011","unstructured":"Kessler GC, Hosmer C (2011) An overview of steganography. Adv Comput 83:51\u2013107","journal-title":"Adv Comput"},{"issue":"3","key":"1943_CR2","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"key":"1943_CR3","doi-asserted-by":"crossref","unstructured":"Fridrich J, Kodovsk\u1ef3 J, Holub V, Goljan M (2011) Breaking HUGO\u2013the process discovery. In: Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers 13. Springer; p. 85\u2013101","DOI":"10.1007\/978-3-642-24178-9_7"},{"key":"1943_CR4","doi-asserted-by":"crossref","unstructured":"Garg M, Ubhi JS, Aggarwal AK. Current Advancements in Steganography: A Review. Modeling and Optimization of Signals Using Machine Learning Techniques. 2024;p. 327\u2013348","DOI":"10.1002\/9781119847717.ch17"},{"key":"1943_CR5","unstructured":"Garg M, Ubhi J, Aggarwal A (2019) Steganography and its advancements in spatial domain. EasyChair Preprint (2177)"},{"issue":"2","key":"1943_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: Seeing the unseen. Computer 31(2):26\u201334. https:\/\/doi.org\/10.1109\/MC.1998.4655281","journal-title":"Computer"},{"key":"1943_CR7","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TIFS.2020.3025438","volume":"16","author":"W Tang","year":"2020","unstructured":"Tang W, Li B, Barni M, Li J, Huang J (2020) An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Trans Inf Forensics Secur 16:952\u2013967","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"1943_CR8","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783\u2013791. https:\/\/doi.org\/10.1109\/83.918570","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"1943_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201\u2013214","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1943_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"Chiou-Ting Hsu","year":"1999","unstructured":"Hsu Chiou-Ting, Ja-Ling Wu (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58\u201368. https:\/\/doi.org\/10.1109\/83.736686","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"1943_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22\u201328","journal-title":"IEEE Multimedia"},{"key":"1943_CR12","unstructured":"Baluja S. Hiding Images in Plain Sight: Deep Steganography. In: Guyon I, Luxburg UV, Bengio S, Wallach H, Fergus R, Vishwanathan S, et\u00a0al., (eds). Advances in Neural Information Processing Systems. vol.\u00a030. Curran Associates, Inc.; 2017. Available from: https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf"},{"key":"1943_CR13","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L. HiDDeN: Hiding Data With Deep Networks. In: Ferrari V, Hebert M, Sminchisescu C, Weiss Y, (eds). Computer Vision - ECCV 2018. vol. 11219. Cham: Springer International Publishing; 2018. p. 682\u2013697. Series Title: Lecture Notes in Computer Science. Available from: https:\/\/link.springer.com\/10.1007\/978-3-030-01267-0_40","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"1943_CR14","doi-asserted-by":"crossref","unstructured":"Jing J, Deng X, Xu M, Wang J, Guan Z (2021) HiNet: Deep Image Hiding by Invertible Network. In: IEEE\/CVF International Conference on Computer Vision (ICCV). Montreal, QC, Canada: IEEE; 2021. p. 4713\u20134722. Available from: https:\/\/ieeexplore.ieee.org\/document\/9711382\/","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"1943_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108419","volume":"133","author":"H Yang","year":"2024","unstructured":"Yang H, Xu Y, Liu X, Ma X (2024) PRIS: Practical robust invertible network for image steganography. Eng Appl Artif Intell 133:108419","journal-title":"Eng Appl Artif Intell"},{"issue":"4","key":"1943_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.14569\/IJACSA.2013.041004","volume":"11","author":"A Tamimi","year":"2013","unstructured":"Tamimi A, Abdalla A, Alallaf O (2013) Hiding an Image inside another Image using Variable-Rate Steganography. Int J Adv Comput Sci Appl 11(4):18\u201321. https:\/\/doi.org\/10.14569\/IJACSA.2013.041004","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"3","key":"1943_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"key":"1943_CR18","doi-asserted-by":"publisher","unstructured":"Pan F, Li J, Yang X (2011) Image steganography method based on PVD and modulus function. 2011 International Conference on Electronics, Communications and Control (ICECC). Sep;p. 282\u2013284. Conference Name: 2011 International Conference on Electronics, Communications and Control (ICECC) ISBN: 9781457703201 Place: Ningbo, China Publisher: IEEE. https:\/\/doi.org\/10.1109\/ICECC.2011.6067590","DOI":"10.1109\/ICECC.2011.6067590"},{"issue":"9\u201310","key":"1943_CR19","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626. https:\/\/doi.org\/10.1016\/S0167-8655(02)00402-6","journal-title":"Pattern Recogn Lett"},{"issue":"7","key":"1943_CR20","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118. https:\/\/doi.org\/10.1109\/TCSVT.2012.2224052","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1943_CR21","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129\u20131143. https:\/\/doi.org\/10.1016\/j.sigpro.2008.12.017","journal-title":"Signal Process"},{"key":"1943_CR22","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/11922841_6","volume-title":"Digital Watermarking","author":"BC Nguyen","year":"2006","unstructured":"Nguyen BC, Yoon SM, Lee HK (2006) Multi Bit Plane Image Steganography. In: Shi YQ, Jeon B (eds) Digital Watermarking. Berlin, Heidelberg, Springer, Berlin Heidelberg, pp 61\u201370"},{"issue":"15","key":"1943_CR23","doi-asserted-by":"publisher","first-page":"10909","DOI":"10.1007\/s00521-023-08274-w","volume":"35","author":"L Zhang","year":"2023","unstructured":"Zhang L, Lu Y, Li J, Chen F, Lu G, Zhang D (2023) Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction. Neural Comput Appl 35(15):10909\u201310927","journal-title":"Neural Comput Appl"},{"key":"1943_CR24","doi-asserted-by":"crossref","unstructured":"Peng Y, Hu D, Pei G, Wang Y (2024) Image Steganography with Deep Orthogonal Fusion of Multi-Scale Channel Attention. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE; p. 4850\u20134854","DOI":"10.1109\/ICASSP48485.2024.10446373"},{"issue":"4","key":"1943_CR25","doi-asserted-by":"publisher","first-page":"6271","DOI":"10.1007\/s11042-022-13596-3","volume":"82","author":"M Garg","year":"2023","unstructured":"Garg M, Ubhi JS, Aggarwal AK (2023) Neural style transfer for image steganography and destylization with supervised image to image translation. Multimedia Tools and Applications. 82(4):6271\u20136288","journal-title":"Multimedia Tools and Applications."},{"issue":"4","key":"1943_CR26","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00530-024-01427-4","volume":"30","author":"X Li","year":"2024","unstructured":"Li X, Chen L, Lai J, Fu Z, Liu S (2024) GAN-based image steganography by exploiting transform domain knowledge with deep networks. Multimedia Syst 30(4):224","journal-title":"Multimedia Syst"},{"key":"1943_CR27","doi-asserted-by":"crossref","unstructured":"Weng X, Li Y, Chi L, Mu Y (2019) High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. In: Proceedings of the 2019 on International Conference on Multimedia Retrieval. ICMR \u201919. New York, NY, USA: Association for Computing Machinery; p. 87\u201395. Available from: https:\/\/doi.org\/10.1145\/3323873.3325011","DOI":"10.1145\/3323873.3325011"},{"key":"1943_CR28","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.neucom.2023.03.041","volume":"537","author":"Z Wang","year":"2023","unstructured":"Wang Z, Feng G, Wu H, Zhang X (2023) Data hiding during image processing using capsule networks. Neurocomputing 537:49\u201360","journal-title":"Neurocomputing"},{"key":"1943_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2023.104035","volume":"98","author":"X Duan","year":"2024","unstructured":"Duan X, Wu G, Li C, Li Z, Qin C (2024) DUIANet: A double layer U-Net image hiding method based on improved Inception module and attention mechanism. J Vis Commun Image Represent 98:104035","journal-title":"J Vis Commun Image Represent"},{"key":"1943_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113469","volume":"171","author":"G Ye","year":"2023","unstructured":"Ye G, Wu H, Liu M, Huang X (2023) Reversible image-hiding algorithm based on singular value sampling and compressive sensing. Chaos, Solitons & Fractals. 171:113469","journal-title":"Chaos, Solitons & Fractals."},{"key":"1943_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2023.109755","volume":"167","author":"H Wu","year":"2023","unstructured":"Wu H, Ye G, Yap WS, Goi BM (2023) Reversible blind image hiding algorithm based on compressive sensing and fusion mechanism. Optics & Laser Technology. 167:109755","journal-title":"Optics & Laser Technology."},{"key":"1943_CR32","doi-asserted-by":"crossref","unstructured":"Zhang X, Li R, Yu J, Xu Y, Li W, Zhang J (2024) Editguard: Versatile image watermarking for tamper localization and copyright protection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition; p. 11964\u201311974","DOI":"10.1109\/CVPR52733.2024.01137"},{"key":"1943_CR33","volume":"118","author":"L Zhang","year":"2023","unstructured":"Zhang L, Lu Y, Li T, Lu G (2023) Joint adjustment image steganography networks. Signal Processing: Image Communication. 118:117022","journal-title":"Signal Processing: Image Communication."},{"key":"1943_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118600","volume":"211","author":"Y Wang","year":"2023","unstructured":"Wang Y, Xiong G, He W (2023) High-capacity reversible data hiding in encrypted images based on pixel-value-ordering and histogram shifting. Expert Syst Appl 211:118600","journal-title":"Expert Syst Appl"},{"key":"1943_CR35","first-page":"10223","volume":"33","author":"C Zhang","year":"2020","unstructured":"Zhang C, Benz P, Karjauv A, Sun G, Kweon IS (2020) Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Adv Neural Inf Process Syst 33:10223\u201310234","journal-title":"Adv Neural Inf Process Syst"},{"key":"1943_CR36","doi-asserted-by":"crossref","unstructured":"Lu SP, Wang R, Zhong T, Rosin PL (2021) Large-capacity Image Steganography Based on Invertible Neural Networks. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Nashville, TN, USA: IEEE; p. 10811\u201310820. Available from: https:\/\/ieeexplore.ieee.org\/document\/9577969\/","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"1943_CR37","unstructured":"Yu J, Zhang X, Xu Y, Zhang J (2024) Cross: Diffusion model makes controllable, robust and secure image steganography. Advance Neural Information Processing Systems. 36"},{"key":"1943_CR38","doi-asserted-by":"crossref","unstructured":"Yang Y, Liu Z, Jia J, Gao Z, Li Y, Sun W, et\u00a0al. (2024) DiffStega: towards universal training-free coverless image steganography with diffusion models. In: Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence; p. 1579\u20131587","DOI":"10.24963\/ijcai.2024\/175"},{"key":"1943_CR39","unstructured":"Dinh L, Krueger D, Bengio Y.: NICE: Non-linear Independent Components Estimation. [cs]. Available from: arxiv:1410.8516"},{"key":"1943_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109822","volume":"144","author":"H Liu","year":"2023","unstructured":"Liu H, Shao M, Qiao Y, Wan Y, Meng D (2023) Unpaired image super-resolution using a lightweight invertible neural network. Pattern Recogn 144:109822","journal-title":"Pattern Recogn"},{"key":"1943_CR41","doi-asserted-by":"crossref","unstructured":"Xiao M, Zheng S, Liu C, Wang Y, He D, Ke G, et\u00a0al. (2020) Invertible Image Rescaling. In: Vedaldi A, Bischof H, Brox T, Frahm JM, editors. Computer Vision - ECCV 2020. vol. 12346. Cham: Springer International Publishing; p. 126\u2013144. Series Title: Lecture Notes in Computer Science. Available from: https:\/\/link.springer.com\/10.1007\/978-3-030-58452-8_8","DOI":"10.1007\/978-3-030-58452-8_8"},{"key":"1943_CR42","volume":"74","author":"DJ Roach","year":"2023","unstructured":"Roach DJ, Rohskopf A, Leguizamon S, Appelhans L, Cook AW (2023) Invertible neural networks for real-time control of extrusion additive manufacturing. Addit Manuf 74:103742","journal-title":"Addit Manuf"},{"key":"1943_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102192","volume":"104","author":"B Tu","year":"2024","unstructured":"Tu B, Ren Q, Li J, Cao Z, Chen Y, Plaza A (2024) NCGLF2: Network combining global and local features for fusion of multisource remote sensing data. Information Fusion. 104:102192","journal-title":"Information Fusion."},{"key":"1943_CR44","doi-asserted-by":"crossref","unstructured":"Wang T, Cheng H, Liu X, Xu Y, Chen F, Wang M et al (2024) Lossless image steganography: Regard steganography as super-resolution. Information Processing & Management. 61(4):103719","DOI":"10.1016\/j.ipm.2024.103719"},{"key":"1943_CR45","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.neunet.2023.03.037","volume":"163","author":"F Shang","year":"2023","unstructured":"Shang F, Lan Y, Yang J, Li E, Kang X (2023) Robust data hiding for JPEG images with invertible neural network. Neural Netw 163:219\u2013232","journal-title":"Neural Netw"},{"key":"1943_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2021.106784","volume":"149","author":"F Wang","year":"2022","unstructured":"Wang F, Ni R, Wang J, Zhu Z, Hu Y (2022) Invertible encryption network for optical image cryptosystem. Opt Lasers Eng 149:106784","journal-title":"Opt Lasers Eng"},{"key":"1943_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107105","volume":"126","author":"X Jia","year":"2023","unstructured":"Jia X, Xin H, Gu L, Wang H, Sun J, Wan W (2023) AFcIHNet: Attention feature-constrained network for single image information hiding. Eng Appl Artif Intell 126:107105","journal-title":"Eng Appl Artif Intell"},{"key":"1943_CR48","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.ins.2023.02.013","volume":"629","author":"Y Yang","year":"2023","unstructured":"Yang Y, Huang Y, Shi M, Chen K, Zhang W (2023) Invertible mask network for face privacy preservation. Inf Sci 629:566\u2013579","journal-title":"Inf Sci"},{"key":"1943_CR49","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, et\u00a0al. (2014) Microsoft coco: Common objects in context. In: Computer Vision\u2013ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, Proceedings, Part V 13. Springer; 2014. p. 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"1943_CR50","doi-asserted-by":"crossref","unstructured":"Agustsson E, Timofte R. (2017) NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops","DOI":"10.1109\/CVPRW.2017.150"},{"issue":"3","key":"1943_CR51","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S et al (2015) ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV). 115(3):211\u2013252. https:\/\/doi.org\/10.1007\/s11263-015-0816-y","journal-title":"International Journal of Computer Vision (IJCV)."},{"key":"1943_CR52","doi-asserted-by":"crossref","unstructured":"Ke X, Wu H, Guo W (2024) StegFormer: rebuilding the glory of autoencoder-based steganography. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038; p. 2723\u20132731","DOI":"10.1609\/aaai.v38i3.28051"},{"key":"1943_CR53","doi-asserted-by":"crossref","unstructured":"Li G, Li S, Qian Z, Zhang X (2024) Cover-separable Fixed Neural Network Steganography via Deep Generative Models. In: Proceedings of the 32nd ACM International Conference on Multimedia; p. 10238\u201310247","DOI":"10.1145\/3664647.3680824"},{"key":"1943_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2025.107148","volume":"185","author":"H Yang","year":"2025","unstructured":"Yang H, Xu Y, Liu X (2025) DKiS: Decay weight invertible image steganography with private key. Neural Netw 185:107148","journal-title":"Neural Netw"},{"key":"1943_CR55","doi-asserted-by":"crossref","unstructured":"Deng X, Chen B, Luo W, Luo D. (2019) Fast and effective global covariance pooling network for image steganalysis. In: Proceedings of the ACM workshop on information hiding and multimedia security; p. 230\u2013234","DOI":"10.1145\/3335203.3335739"},{"key":"1943_CR56","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TIFS.2019.2936913","volume":"15","author":"R Zhang","year":"2019","unstructured":"Zhang R, Zhu F, Liu J, Liu G (2019) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans Inf Forensics Secur 15:1138\u20131150","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01943-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-01943-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-01943-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T11:09:53Z","timestamp":1750331393000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-01943-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,6]]},"references-count":56,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1943"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-01943-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,6,6]]},"assertion":[{"value":"30 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this manuscript declare that they have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Interest statement"}}],"article-number":"323"}}