{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T11:49:31Z","timestamp":1773229771469,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T00:00:00Z","timestamp":1768003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":31,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100004479","name":"Jiangxi Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["20252BAC200613"],"award-info":[{"award-number":["20252BAC200613"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2023YFB3106900"],"award-info":[{"award-number":["2023YFB3106900"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372334"],"award-info":[{"award-number":["62372334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s44443-025-00456-x","type":"journal-article","created":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T09:46:01Z","timestamp":1768038361000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Controllable generative image steganography based on denoising diffusion implicit model"],"prefix":"10.1007","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5994-6069","authenticated-orcid":false,"given":"Tian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xuan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chunnian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,10]]},"reference":[{"key":"456_CR1","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In ICIP, IEEE, pp 4206\u20134210","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"456_CR2","doi-asserted-by":"crossref","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181\u20131193","DOI":"10.1109\/TIFS.2018.2871749"},{"issue":"5","key":"456_CR3","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"456_CR4","unstructured":"Dhariwal P, Nichol A (2021) Diffusion models beat gans on image synthesis. Adv Neural Inf Process Syst 34:8780\u20138794"},{"key":"456_CR5","doi-asserted-by":"crossref","unstructured":"Olson E, Carter L, Liu Q (2017) A comparison study using stegexpose for steganalysis","DOI":"10.18178\/ijke.2017.3.1.079"},{"key":"456_CR6","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal P, Nichol A (2021) Diffusion models beat gans on image synthesis. Adv Neural Inf Process Syst 34:8780\u20138794","journal-title":"Adv Neural Inf Process Syst"},{"key":"456_CR7","doi-asserted-by":"crossref","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920\u2013935","DOI":"10.1109\/TIFS.2011.2134094"},{"issue":"3","key":"456_CR8","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920\u2013935","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"456_CR9","first-page":"2017","volume":"30","author":"M Heusel","year":"2017","unstructured":"Heusel M, Ramsauer H, Unterthiner T, Nessler B, Hochreiter S (2017) Gans trained by a two time-scale update rule converge to a local nash equilibrium. Adv Neural Information processing systems 30:2017","journal-title":"Adv Neural Information processing systems"},{"key":"456_CR10","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho J, Jain A, Abbeel P (2020) Denoising diffusion probabilistic models. Adv Neural Inf Process Syst 33:6840\u20136851","journal-title":"Adv Neural Inf Process Syst"},{"key":"456_CR11","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomput 335:299\u2013326","journal-title":"Neurocomput"},{"key":"456_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2025.103537","volume":"67","author":"X Kang","year":"2025","unstructured":"Kang X, You W, Luo Y (2025) Bio-inspired product design system integrating retrieval-augmented question answering and semantic fusion diffusion model. Adv Eng Inform 67:103537","journal-title":"Adv Eng Inform"},{"key":"456_CR13","doi-asserted-by":"crossref","unstructured":"Kang X, You W, Luo Y (2025) Bio-inspired product design system integrating retrieval-augmented question answering and semantic fusion diffusion model. Adv Eng Inform 67:103537","DOI":"10.1016\/j.aei.2025.103537"},{"key":"456_CR14","first-page":"4206","volume-title":"A new cost function for spatial image steganography","author":"B Li","year":"2014","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In ICIP, IEEE, pp 4206\u20134210"},{"issue":"2","key":"456_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103222","volume":"60","author":"M Li","year":"2023","unstructured":"Li M, Wang X, Cui Q, Zhang J (2023) Adversarial data hiding with only one pixel. Inf Process Manag 60(2):103222","journal-title":"Inf Process Manag"},{"key":"456_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2025.103776","volume":"68","author":"X Li","year":"2025","unstructured":"Li X, Xudong W, Jun Yu, Wang T, Shi C, Choi J-H, Chu F (2025) A fault diagnosis data augmentation method integrating multimodal non-gaussian denoising diffusion generative adversarial network. Adv Eng Inform 68:103776","journal-title":"Adv Eng Inform"},{"key":"456_CR17","doi-asserted-by":"crossref","unstructured":"Ma Y, Xinquan Yu, Luo X, Liu D, Zhang Y (2023) Adaptive feature selection for image steganalysis based on classification metrics. Inf Sci 644:118973","DOI":"10.1016\/j.ins.2023.118973"},{"issue":"7","key":"456_CR18","doi-asserted-by":"publisher","first-page":"4472","DOI":"10.1016\/j.jksuci.2022.05.012","volume":"34","author":"X Liu","year":"2022","unstructured":"Liu X, Li Z, Ma J, Zhang W, Zhang J, Ding Y (2022) Robust coverless steganography using limited mapping images. J King Saud Univ - Comput Inf Sci 34(7):4472\u20134482","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"456_CR19","doi-asserted-by":"crossref","unstructured":"Xiao M, Zheng S, Liu C, Wang Y, He D, Ke G, Bian J, Lin Z, Liu TY (2020) Invertible image rescaling. In ECCV, Springer, pp 126\u2013144","DOI":"10.1007\/978-3-030-58452-8_8"},{"key":"456_CR20","doi-asserted-by":"crossref","unstructured":"Sahu M, Padhy N, Gantayat SS (2022) Multi-directional pvd steganography avoiding pdh and boundary issue. J King Saud Univ -Comput Inf Sci 34(10):8838\u20138851","DOI":"10.1016\/j.jksuci.2021.10.007"},{"key":"456_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118973","volume":"644","author":"Y Ma","year":"2023","unstructured":"Ma Y, Xinquan Yu, Luo X, Liu D, Zhang Y (2023) Adaptive feature selection for image steganalysis based on classification metrics. Inf Sci 644:118973","journal-title":"Inf Sci"},{"key":"456_CR22","doi-asserted-by":"crossref","unstructured":"Zhou Q, Wei P, Qian Z et\u00a0al (2025) Improved generative steganography based on diffusion model. IEEE Trans Circ Syst Video Technol","DOI":"10.1109\/TCSVT.2025.3539832"},{"key":"456_CR23","doi-asserted-by":"crossref","unstructured":"Abdal R, Qin Y, Wonka P (2019) Image2stylegan: How to embed images into the stylegan latent space? In CVPR, pp 4432\u20134441","DOI":"10.1109\/ICCV.2019.00453"},{"key":"456_CR24","first-page":"161","volume-title":"Using high-dimensional image models to perform highly undetectable steganography","author":"T Pevn\u1ef3","year":"2010","unstructured":"Pevn\u1ef3 T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Springer, In IH, pp 161\u2013177"},{"key":"456_CR25","doi-asserted-by":"crossref","unstructured":"Doo SY, Tena S, Ndolu VM (2019) Implementasi pengamanan data menggunakan metode kriptografi hill cipher dan steganografi least significant bit (lsb) pada media citra digital. Jurnal Media Elektro, pp 90\u201396","DOI":"10.35508\/jme.v0i0.1778"},{"key":"456_CR26","doi-asserted-by":"crossref","unstructured":"Schuhmann C, Beaumont R, Vencu R, Gordon C, Wightman R, Cherti M, Coombes T, Katta A, Mullis C, Wortsman M, Schramowski P, Kundurthy S, Crowson K, Schmidt L, Kaczmarczyk R, Jitsev J (2022) LAION-5B: An open large-scale dataset for training next generation image-text models. Adv Neural Inf Process Syst 35:25278\u201325294","DOI":"10.52202\/068431-1833"},{"key":"456_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127403","volume":"279","author":"JG Rajan","year":"2025","unstructured":"Rajan JG, Ganesh RS (2025) Dynamic pixel shuffling and hash lsb steganography with rc4 encryption: A robust data security framework. Expert Syst Appl 279:127403","journal-title":"Expert Syst Appl"},{"key":"456_CR28","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky O, Deng J, Hao S, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M et al (2015) Imagenet large scale visual recognition challenge. Int J Comput Vision 115:211\u2013252","journal-title":"Int J Comput Vision"},{"issue":"10","key":"456_CR29","doi-asserted-by":"publisher","first-page":"8838","DOI":"10.1016\/j.jksuci.2021.10.007","volume":"34","author":"M Sahu","year":"2022","unstructured":"Sahu M, Padhy N, Gantayat SS (2022) Multi-directional pvd steganography avoiding pdh and boundary issue. J King Saud Univ -Comput Inf Sci 34(10):8838\u20138851","journal-title":"J King Saud Univ -Comput Inf Sci"},{"key":"456_CR30","first-page":"25278","volume":"35","author":"C Schuhmann","year":"2022","unstructured":"Schuhmann C, Beaumont R, Vencu R, Gordon C, Wightman R, Cherti M, Coombes T, Katta A, Mullis C, Wortsman M, Schramowski P, Kundurthy S, Crowson K, Schmidt L, Kaczmarczyk R, Jitsev J (2022) LAION-5B: An open large-scale dataset for training next generation image-text models. Adv Neural Inf Process Syst 35:25278\u201325294","journal-title":"Adv Neural Inf Process Syst"},{"issue":"10","key":"456_CR31","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W Tang","year":"2017","unstructured":"Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547\u20131551","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"456_CR32","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W Tang","year":"2019","unstructured":"Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14(8):2074\u20132087","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"456_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102109","volume":"36","author":"W Tian","year":"2024","unstructured":"Tian W, Xuan H, Liu C, Wang Y, Zhu Y (2024) An efficient steganography scheme based on wavelet transformation for side-information estimation. J King Saud Univ - Comput Inf Sci 36(6):102109","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"6","key":"456_CR34","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Yu-Chen H, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129\u20131143","journal-title":"Signal Process"},{"key":"456_CR35","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Bourdev L, Girshick R, Hays J, Perona P, Ramanan D, Zitnick CL, Doll\u00e1r P (2014) Microsoft COCO: Common objects in context. arXiv preprint arXiv:1405.0312. Dataset contains 91 object categories with 2.5 million labeled instances in 328k images","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"456_CR36","doi-asserted-by":"crossref","unstructured":"Bui T, Agarwal S, Yu N, Collomosse J (2023) Rosteals: Robust steganography using autoencoder latent space. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 933\u2013942","DOI":"10.1109\/CVPRW59228.2023.00100"},{"key":"456_CR37","first-page":"126","volume-title":"Invertible image rescaling","author":"M Xiao","year":"2020","unstructured":"Xiao M, Zheng S, Liu C, Wang Y, He D, Ke G, Bian J, Lin Z, Liu TY (2020) Invertible image rescaling. Springer, In ECCV, pp 126\u2013144"},{"key":"456_CR38","doi-asserted-by":"publisher","first-page":"8094","DOI":"10.1109\/TIFS.2024.3444311","volume":"19","author":"H Xiaoxiao","year":"2024","unstructured":"Xiaoxiao H, Li S, Ying Q, Peng W, Zhang X, Qian Z (2024) Establishing robust generative image steganography via popular stable diffusion. IEEE Trans Inf Forensics Secur 19:8094\u20138108","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"456_CR39","doi-asserted-by":"crossref","unstructured":"Liu X, Ma Z, Ma J, Zhang J, Schaefer G, Fang H (2022) Image disentanglement autoencoder for steganography without embedding. In CVPR, pp 2303\u20132312","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"456_CR40","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TIFS.2020.3023279","volume":"16","author":"ZL Yang","year":"2020","unstructured":"Yang ZL, Zhang SY, Yu-Ting H, Zhi-Wen H, Huang YF (2020) Vae-stega: linguistic steganography based on variational auto-encoder. IEEE Trans Inf Forensics Secur 16:880\u2013895","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"456_CR41","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","volume":"16","author":"W You","year":"2021","unstructured":"You W, Zhang H, Zhao X (2021) A siamese cnn for image steganalysis. IEEE Trans Inf Forensics Secur 16:291\u2013306","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"456_CR42","doi-asserted-by":"crossref","unstructured":"Peng Y, Hu D, Wang Y, Chen K, Pei G, Zhang W (2023) Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model. In Proceedings of the 31st ACM international conference on multimedia, pp 7143\u20137151","DOI":"10.1145\/3581783.3612514"},{"key":"456_CR43","doi-asserted-by":"crossref","unstructured":"Qiu Y, Tian H, Li H, Chang CC, Vasilakos AV (2023) Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2023.3269640"},{"key":"456_CR44","doi-asserted-by":"crossref","unstructured":"You W, Zhang H, Zhao X (2021) A siamese cnn for image steganalysis. IEEE Trans Inf Forensics Secur 16:291\u2013306","DOI":"10.1109\/TIFS.2020.3013204"},{"key":"456_CR45","doi-asserted-by":"crossref","unstructured":"Xu Y, Mou C, Hu Y, Xie J, Zhang J (2022) Robust invertible image steganography. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 7875\u20137884","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"456_CR46","doi-asserted-by":"crossref","unstructured":"Zhou Z, Dong X, Meng R, Wang M, Yan H, Yu K, Choo KKR (2023) Generative steganography via auto-generation of semantic object contours. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2023.3268843"},{"key":"456_CR47","doi-asserted-by":"crossref","unstructured":"Zhou Z, Yuecheng S, Li J, Yu K, Jonathan Wu QM, Fu Z, Shi Y (2022) Secret-to-image reversible transformation for generative steganography. IEEE Trans Depend Secure Comput","DOI":"10.1109\/TDSC.2022.3217661"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00456-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00456-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00456-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:39:55Z","timestamp":1773153595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00456-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,10]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["456"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00456-x","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,10]]},"assertion":[{"value":"25 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}