{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T04:36:33Z","timestamp":1776918993432,"version":"3.51.2"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100013076","name":"National Major Science and Technology Projects of China","doi-asserted-by":"publisher","award":["2025ZD0123702"],"award-info":[{"award-number":["2025ZD0123702"]}],"id":[{"id":"10.13039\/501100013076","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018537","name":"National Science and Technology Major Project","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018537","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2023603C043"],"award-info":[{"award-number":["JCKY2023603C043"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jisa.2026.104376","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:55:29Z","timestamp":1769511329000},"page":"104376","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Decoupled framework for non-additive adversarial image steganography"],"prefix":"10.1016","volume":"98","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8502-9643","authenticated-orcid":false,"given":"Junfeng","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5748-5438","authenticated-orcid":false,"given":"Shen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104376_bib0001","series-title":"Security, steganography, and watermarking of multimedia contents IX","first-page":"13","article-title":"Practical methods for minimizing embedding impact in steganography","volume":"vol. 6505","author":"Fridrich","year":"2007"},{"key":"10.1016\/j.jisa.2026.104376_bib0002","series-title":"2012 IEEE International workshop on information forensics and security (WIFS)","first-page":"234","article-title":"Designing steganographic distortion using directional filters","author":"Holub","year":"2012"},{"issue":"1","key":"10.1016\/j.jisa.2026.104376_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","article-title":"Universal distortion function for steganography in an arbitrary domain","volume":"2014","author":"Holub","year":"2014","journal-title":"EURASIP J Inf Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0004","series-title":"2014 IEEE International conference on image processing (ICIP)","first-page":"4206","article-title":"A new cost function for spatial image steganography","author":"Li","year":"2014"},{"issue":"2","key":"10.1016\/j.jisa.2026.104376_bib0005","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","article-title":"Content-adaptive steganography by minimizing statistical detectability","volume":"11","author":"Sedighi","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10.1016\/j.jisa.2026.104376_bib0006","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","article-title":"Uniform embedding for efficient JPEG steganography","volume":"9","author":"Guo","year":"2014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"10.1016\/j.jisa.2026.104376_bib0007","doi-asserted-by":"crossref","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","article-title":"Using statistical image model for JPEG steganography: uniform embedding revisited","volume":"10","author":"Guo","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10.1016\/j.jisa.2026.104376_bib0008","doi-asserted-by":"crossref","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","article-title":"Minimizing additive distortion in steganography using syndrome-trellis codes","volume":"6","author":"Filler","year":"2011","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10.1016\/j.jisa.2026.104376_bib0009","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","article-title":"Rich models for steganalysis of digital images","volume":"7","author":"Fridrich","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0010","series-title":"2014 IEEE International workshop on information forensics and security (WIFS)","first-page":"48","article-title":"Selection-channel-aware rich model for steganalysis of digital images","author":"Denemark","year":"2014"},{"key":"10.1016\/j.jisa.2026.104376_bib0011","series-title":"Proceedings of the 3rd ACM workshop on information hiding and multimedia security","isbn-type":"print","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2756601.2756608","article-title":"Steganalysis of adaptive JPEG steganography using 2D gabor filters","author":"Song","year":"2015","ISBN":"https:\/\/id.crossref.org\/isbn\/9781450335874"},{"issue":"2","key":"10.1016\/j.jisa.2026.104376_bib0012","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","article-title":"Ensemble classifiers for steganalysis of digital media","volume":"7","author":"Kodovsky","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10.1016\/j.jisa.2026.104376_bib0013","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","article-title":"Structural design of convolutional neural networks for steganalysis","volume":"23","author":"Xu","year":"2016","journal-title":"IEEE Signal Process Lett"},{"issue":"11","key":"10.1016\/j.jisa.2026.104376_bib0014","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","article-title":"Deep learning hierarchical representations for image steganalysis","volume":"12","author":"Ye","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0015","series-title":"2018 IEEE international conference on acoustics, speech and signal processing (ICASSP)","first-page":"2092","article-title":"Yedroudj-Net: an efficient CNN for spatial steganalysis","author":"Yedroudj","year":"2018"},{"issue":"5","key":"10.1016\/j.jisa.2026.104376_bib0016","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","article-title":"Deep residual network for steganalysis of digital images","volume":"14","author":"Boroumand","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0017","series-title":"Proceedings of the ACM workshop on information hiding and multimedia security","first-page":"230","article-title":"Fast and effective global covariance pooling network for image steganalysis","author":"Deng","year":"2019"},{"key":"10.1016\/j.jisa.2026.104376_bib0018","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","article-title":"A siamese CNN for image steganalysis","volume":"16","author":"You","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0019","unstructured":"Goodfellow I.J., Shlens J., Szegedy C.. Explaining and harnessing adversarial examples. 2014.. https:\/\/arxiv.org\/abs\/1412.6572. 10.48550\/ARXIV.1412.6572."},{"issue":"8","key":"10.1016\/j.jisa.2026.104376_bib0020","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","article-title":"CNN-based adversarial embedding for image steganography","volume":"14","author":"Tang","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"22","key":"10.1016\/j.jisa.2026.104376_bib0021","doi-asserted-by":"crossref","first-page":"32503","DOI":"10.1007\/s11042-019-07994-3","article-title":"Adaptive spatial steganography based on adversarial examples","volume":"78","author":"Ma","year":"2019","journal-title":"Multimedia Tools Appl"},{"key":"10.1016\/j.jisa.2026.104376_bib0022","doi-asserted-by":"crossref","first-page":"4621","DOI":"10.1109\/TIFS.2021.3111748","article-title":"A new adversarial embedding method for enhancing image steganography","volume":"16","author":"Liu","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0023","first-page":"1","article-title":"Adversarial steganography embedding via stego generation and selection","author":"Liu","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2026.104376_bib0024","first-page":"1","article-title":"Saliency map construction for adversarial image steganography","volume":"34","author":"Junfeng","year":"2024","journal-title":"Chin J Electron"},{"key":"10.1016\/j.jisa.2026.104376_bib0025","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1109\/TIFS.2020.3021913","article-title":"Explicit optimization of min max steganographic game","volume":"16","author":"Bernard","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0026","doi-asserted-by":"crossref","DOI":"10.1016\/j.displa.2025.103093","article-title":"MAX-game: a game-theoretic approach to parameter selection for non-iterative adversarial image steganography","volume":"90","author":"Zhao","year":"2025","journal-title":"Displays"},{"key":"10.1016\/j.jisa.2026.104376_bib0027","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1109\/TIFS.2020.3029908","article-title":"Non-additive cost functions for JPEG steganography based on block boundary maintenance","volume":"16","author":"Wang","year":"2021","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0028","series-title":"Proceedings of the 3rd ACM workshop on information hiding and multimedia security","first-page":"5","article-title":"Improving steganographic security by synchronizing the selection channel","author":"Denemark","year":"2015"},{"issue":"9","key":"10.1016\/j.jisa.2026.104376_bib0029","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","article-title":"A strategy of clustering modification directions in spatial image steganography","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104376_bib0030","doi-asserted-by":"crossref","unstructured":"Wang D., Yang G., Guo Z., Chen J.. Enhancing adversarial embedding based image steganography via clustering modification directions2023; 20(1). 10.1145\/3603377. 10.1145\/3603377.","DOI":"10.1145\/3603377"},{"key":"10.1016\/j.jisa.2026.104376_bib0031","series-title":"Information hiding","first-page":"59","article-title":"\u201dBreak our steganographic system\u201d: the ins and outs of organizing BOSS","author":"Bas","year":"2011"},{"key":"10.1016\/j.jisa.2026.104376_bib0032","unstructured":"Patrick B., Teddy F.. Bows-2. 2007. http:\/\/bows2.ec-lille.fr\/."}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000062?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000062?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T03:46:02Z","timestamp":1776915962000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":32,"alternative-id":["S2214212626000062"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104376","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Decoupled framework for non-additive adversarial image steganography","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104376","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104376"}}