{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:29Z","timestamp":1774942589250,"version":"3.50.1"},"reference-count":124,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636114"],"award-info":[{"award-number":["U1636114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772550"],"award-info":[{"award-number":["61772550"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572521"],"award-info":[{"award-number":["61572521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379152"],"award-info":[{"award-number":["61379152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61403417"],"award-info":[{"award-number":["61403417"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund of China","award":["MMJJ20170112"],"award-info":[{"award-number":["MMJJ20170112"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2983175","type":"journal-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T21:11:13Z","timestamp":1585170673000},"page":"60575-60597","source":"Crossref","is-referenced-by-count":86,"title":["Recent Advances of Image Steganography With Generative Adversarial Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8104-0079","authenticated-orcid":false,"given":"Jia","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6229-9998","authenticated-orcid":false,"given":"Yan","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99807-7_3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_21"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24624-4_3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2014.6911224"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482514"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77370-2_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881680"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.465313"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.02.003"},{"key":"ref20","first-page":"2069","article-title":"Hiding images in plain sight: Deep steganography","author":"baluja","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref22","article-title":"The prisoners&#x2019; problem and the subliminal channel","author":"simmons","year":"1983","journal-title":"Proc Crypto"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref24","first-page":"288","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"li","year":"2011","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_20"},{"key":"ref101","article-title":"Deep learning face attributes in the wild","author":"liu","year":"2014","journal-title":"arXiv 1411 7766"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.14445\/22315381\/IJETT-V64P204"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref50","first-page":"25","article-title":"Robust steganography using texture synthesis","author":"qian","year":"2016","journal-title":"Proc 12th Int Conf Intell Inf Hiding Multimedia Signal Process"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-014-1045-z"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2869276"},{"key":"ref58","article-title":"Semantic image inpainting with perceptual and contextual losses","author":"yeh","year":"2016","journal-title":"arXiv 1607 07539"},{"key":"ref57","article-title":"Improved training of wasserstein GANs","author":"gulrajani","year":"2017","journal-title":"arXiv 1704 00028"},{"key":"ref56","article-title":"Mode regularized generative adversarial networks","author":"che","year":"2016","journal-title":"arXiv 1612 02136"},{"key":"ref55","article-title":"Conditional image synthesis with auxiliary classifier GANs","author":"odena","year":"2016","journal-title":"arXiv 1610 09585"},{"key":"ref54","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"arXiv 1411 1784"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2878290"},{"key":"ref52","first-page":"625","article-title":"Steganography by constructing texture images","volume":"34","author":"pan","year":"2016","journal-title":"J Appl Sci"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_33"},{"key":"ref4","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2016","journal-title":"arXiv 1511 06434"},{"key":"ref3","article-title":"Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"arXiv 1406 2661"},{"key":"ref6","article-title":"Wasserstein GAN","author":"arjovsky","year":"2017","journal-title":"arXiv 1701 07875"},{"key":"ref5","article-title":"Improved techniques for training GANs","author":"salimans","year":"2016","journal-title":"arXiv 1606 03498"},{"key":"ref8","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","author":"chen","year":"2016","journal-title":"arXiv 1606 03657"},{"key":"ref49","first-page":"130","article-title":"Steganography using reversible texture synthesis","volume":"7","author":"wu","year":"2015","journal-title":"Int J Eng Technol"},{"key":"ref7","article-title":"BEGAN: Boundary equilibrium generative adversarial networks","author":"berthelot","year":"2017","journal-title":"arXiv 1703 10717"},{"key":"ref9","article-title":"Energy-based generative adversarial network","author":"zhao","year":"2016","journal-title":"arXiv 1609 03126"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374554"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRA.1999.805726"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.127"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73214-3_13"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.33"},{"key":"ref41","first-page":"764","article-title":"Cover selection for image steganography based on image characteristics","volume":"25","author":"yang","year":"2014","journal-title":"J Optoelectron Laser"},{"key":"ref44","first-page":"524","article-title":"A Bayesian hierarchical model for learning natural scene categories","volume":"2","author":"li","year":"2005","journal-title":"Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27051-7_11"},{"key":"ref124","article-title":"When provably secure steganography meets generative models","author":"chen","year":"2018","journal-title":"arXiv 1811 03732"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3632-7"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.194"},{"key":"ref71","article-title":"Neural style transfer: A review","author":"jing","year":"2017","journal-title":"arXiv 1705 04058"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.374"},{"key":"ref76","first-page":"181","article-title":"Design of adaptive steganographic schemes for digital images","volume":"7880","author":"filler","year":"2011","journal-title":"Electron Imag"},{"key":"ref77","first-page":"1703","article-title":"Technical points about adaptive steganography by oracle (ASO)","author":"kouider","year":"2012","journal-title":"Proc 20th Eur Signal Process Conf (EUSIPCO)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_22"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1117\/12.703334"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206012"},{"key":"ref79","article-title":"Steganographic generative adversarial networks","author":"volkhonskiy","year":"2017","journal-title":"arXiv 1703 05502"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.364"},{"key":"ref62","article-title":"Semantic segmentation using adversarial networks","author":"luc","year":"2016","journal-title":"ArXiv 1611 08408"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.324"},{"key":"ref63","article-title":"Adversarial generation of natural language","author":"rajeswar","year":"2017","journal-title":"arXiv 1705 10929"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1230"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00196"},{"key":"ref66","article-title":"F-GAN: Training generative neural samplers using variational divergence minimization","author":"nowozin","year":"2016","journal-title":"arXiv 1606 00709"},{"key":"ref67","article-title":"Generative adversarial text to image synthesis","author":"reed","year":"2016","journal-title":"arXiv 1605 05396"},{"key":"ref68","article-title":"Learning what and where to draw","author":"reed","year":"2016","journal-title":"arXiv 1610 02454"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45817-5_22"},{"key":"ref69","article-title":"StackGAN: Text to photo-realistic image synthesis with stacked generative adversarial networks","author":"zhang","year":"2016","journal-title":"arXiv 1612 03242"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"ref95","article-title":"Coverless information hiding based on generative adversarial networks","author":"liu","year":"2017","journal-title":"arXiv 1712 06951"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref94","article-title":"An generative steganography method based on WGAN-GP","author":"li","year":"2020","journal-title":"Proc Int Conf Artif Intell Secur"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25958-1_8"},{"key":"ref93","article-title":"StegaStamp: Invisible hyperlinks in physical photographs","author":"tancik","year":"2019","journal-title":"arXiv 1904 05343"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10599-4_29"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref91","article-title":"SteganoGAN: High capacity image steganography with GANs","author":"alex zhang","year":"2019","journal-title":"arXiv 1901 03892"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref90","article-title":"Learning to protect communications with adversarial neural cryptography","author":"abadi","year":"2016","journal-title":"arXiv 1610 06918"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2010.5586786"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref111","article-title":"GANs trained by a two time-scale update rule converge to a Nash equilibrium","author":"heusel","year":"2018","journal-title":"arXiv 1706 08500"},{"key":"ref112","article-title":"A kernel method for the two-sample problem","author":"gretton","year":"2008","journal-title":"arXiv 0805 2368"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","article-title":"Edge adaptive image steganography based on LSB matching revisited","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref98","article-title":"CycleGAN, a master of steganography","author":"chu","year":"2017","journal-title":"arXiv 1712 02950"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4932782"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920313"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref10","article-title":"SeqGAN: Sequence generative adversarial nets with policy gradient","author":"yu","year":"2017","journal-title":"arXiv 1609 05473"},{"key":"ref11","article-title":"Generative adversarial networks: An overview","author":"creswell","year":"2017","journal-title":"arXiv 1710 07035"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886814"},{"key":"ref13","article-title":"An introduction to image synthesis with generative adversarial nets","author":"huang","year":"2018","journal-title":"arXiv 1803 04469"},{"key":"ref14","article-title":"Spatial image steganography based on generative adversarial network","author":"yang","year":"2018","journal-title":"arXiv 1804 07939"},{"key":"ref15","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"arXiv 1703 00371"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6640-y"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"ref81","first-page":"2923","article-title":"Information hiding scheme based on generative adversarial network","volume":"38","author":"wang","year":"2018","journal-title":"J Comput Appl"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297255"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref119","first-page":"527","article-title":"Coverless information hiding based on bag-of-words model of image","volume":"34","author":"zhou","year":"2016","journal-title":"J Appl Sci"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref113","article-title":"Revisiting classifier two-sample tests","author":"lopez-paz","year":"2016","journal-title":"arXiv 1610 06545"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref80","article-title":"Deep learning for steganalysis via convolutional neural networks","author":"qian","year":"2015","journal-title":"Proc of the SPIE Media Watermarking Security and Forensics"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63315-2_47"},{"key":"ref89","article-title":"Adaptive spatial steganography based on probability-controlled adversarial examples","author":"ma","year":"2018","journal-title":"arXiv 1804 02691"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14680-1_29"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2017.131"},{"key":"ref123","first-page":"215","article-title":"Glow: Generative flow with invertible \n$1\\times1$\n convolutions","volume":"10","author":"kingma","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref86","article-title":"Deep learning in steganography and steganalysis from 2015 to 2018","author":"chaumont","year":"2019","journal-title":"arXiv 1904 01444"},{"key":"ref87","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv 1412 6572"},{"key":"ref88","article-title":"CNN based adversarial embedding with minimum alteration for image steganography","author":"tang","year":"2018","journal-title":"arXiv 1803 09043"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09046754.pdf?arnumber=9046754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:11Z","timestamp":1642003031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9046754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":124,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2983175","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}