{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:12:13Z","timestamp":1761664333526,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for Promotion of Science (JSPS) KAKENHI","doi-asserted-by":"publisher","award":["JP16H06302","JP18H04120","JP20K23355","JP21H04907","JP21K18023"],"award-info":[{"award-number":["JP16H06302","JP18H04120","JP20K23355","JP21H04907","JP21K18023"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology (CREST) from Japan Science and Technology Corporation (JST), Japan","doi-asserted-by":"publisher","award":["JPMJCR18A6","JPMJCR20D3"],"award-info":[{"award-number":["JPMJCR18A6","JPMJCR20D3"]}],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Education-Scientific Project for Youth Teacher of Fujian Province, China","award":["JT180618"],"award-info":[{"award-number":["JT180618"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3105590","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T20:46:11Z","timestamp":1629233171000},"page":"116427-116439","source":"Crossref","is-referenced-by-count":10,"title":["Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT"],"prefix":"10.1109","volume":"9","author":[{"given":"Sisheng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/566654.566602"},{"key":"ref32","first-page":"156","article-title":"Image morphing algorithm: A survey","volume":"5","author":"patel","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref31","first-page":"386","article-title":"A generative steganography method based on WGAN-GP","volume":"1252","author":"li","year":"2020","journal-title":"Proc Int Conf Artif Intell Secur"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983175"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref35","first-page":"1","article-title":"Progressive growing of GANs for improved quality, stability, and variation","author":"karras","year":"2018","journal-title":"Proc 6th Int Conf Learn Represent (ICLR)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ECBIOS50299.2020.9203749"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00239-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.09.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.03.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08427-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4932782"},{"key":"ref18","first-page":"1","article-title":"Neural reversible steganography with long short-term memory","volume":"2021","author":"chang","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034936"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993587"},{"key":"ref27","first-page":"1","article-title":"Unsupervised representation learning with deep convolutional generative Adversarial networks","author":"radford","year":"2015","journal-title":"Proc ICLR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019168"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075282"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S012905411350024X"},{"key":"ref2","first-page":"313","article-title":"Safeguarding cryptographic keys","author":"blakley","year":"1899","journal-title":"Proc Int Workshop Manag Requirement Knowl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.11.015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref20","first-page":"1","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6951-z"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2963180"},{"key":"ref24","first-page":"2672","article-title":"Generative adversarial nets","volume":"3","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref26","first-page":"1681","article-title":"Generative adversarial text to image synthesis","volume":"3","author":"reed","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn (ICML)"},{"key":"ref25","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014","journal-title":"arXiv 1411 1784"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09514916.pdf?arnumber=9514916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:32Z","timestamp":1639771052000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9514916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3105590","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}