{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T14:06:47Z","timestamp":1768831607401,"version":"3.49.0"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3034936","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T20:19:27Z","timestamp":1604089167000},"page":"198425-198435","source":"Crossref","is-referenced-by-count":44,"title":["Adversarial Learning for Invertible Steganography"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-4591","authenticated-orcid":false,"given":"Ching-Chun","family":"Chang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"li","year":"2011","journal-title":"IEEE Trans Image Process"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2433194"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2307482"},{"key":"ref39","first-page":"1954","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2598528"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799381"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2915584"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2246179"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2224108"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"ni","year":"2006","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983175"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2566261"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.905146"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.809729"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.304"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0135"},{"key":"ref63","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume":"70","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2439281"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.618"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2162424"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00984"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2891131"},{"key":"ref2","first-page":"161","article-title":"Using high-dimensional image models to perform highly undetectable steganography","author":"pevn\u00fd","year":"2010","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref20","article-title":"Lossless recovery of an original image containing embedded data","author":"honsinger","year":"2001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.435400"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2002.1027818"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2851074"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2187667"},{"key":"ref50","first-page":"420","article-title":"On the surprising behavior of distance metrics in high dimensional space","author":"aggarwal","year":"2001","journal-title":"Proc Int Conf Database Theory (ICDT)"},{"key":"ref51","article-title":"The USC-SIPI image database: Version 5","author":"weber","year":"2006"},{"key":"ref59","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref58","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref57","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"glorot","year":"2010","journal-title":"Proc Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref56","first-page":"1","article-title":"Rectifier nonlinearities improve neural network acoustic models","author":"maas","year":"2013","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref55","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proc Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref54","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0450(1979)018<1016:LFIOAT>2.0.CO;2"},{"key":"ref52","first-page":"59","article-title":"Break our steganographic system: The ins and outs of organizing BOSS","author":"bas","year":"2011","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723401"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/5.771070"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/83.951543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.822884"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"ref15","first-page":"1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref82","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref16","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref18","first-page":"1","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2017","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908924"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/5.687830"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref49","first-page":"234","article-title":"U-Net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Proc Int Conf Med Image Comput Comput -Assist Intervent (MICCAI)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881680"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref47","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2963180"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09245471.pdf?arnumber=9245471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T20:46:48Z","timestamp":1643143608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9245471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3034936","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}