{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:39:00Z","timestamp":1772642340972,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62473278"],"award-info":[{"award-number":["62473278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"publisher","award":["LH2021F056"],"award-info":[{"award-number":["LH2021F056"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011787","name":"Heilongjiang Provincial Education Department","doi-asserted-by":"publisher","award":["1355091130"],"award-info":[{"award-number":["1355091130"]}],"id":[{"id":"10.13039\/501100011787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3477469","type":"journal-article","created":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:25:48Z","timestamp":1728581148000},"page":"148770-148782","source":"Crossref","is-referenced-by-count":8,"title":["Coverless Steganography for Face Recognition Based on Diffusion Model"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6997-2316","authenticated-orcid":false,"given":"Yuan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Heilongjiang University, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8828-8748","authenticated-orcid":false,"given":"Ziqi","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Heilongjiang University, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2019.8853753"},{"issue":"11","key":"ref2","first-page":"p93","article-title":"FaceEncAuth: Face recognition privacy security scheme based on facenet and smalgorithms","volume":"58","author":"Junqing","year":"2022","journal-title":"J. Comput. Eng. Appl."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0009380203500358"},{"issue":"6","key":"ref4","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5121\/ijcses.2013.4602","article-title":"A study of various steganographic techniques used for information hiding","volume":"4","author":"Sumathi","year":"2013","journal-title":"Int. J. Comput. Sci. Eng. Surv."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"issue":"1","key":"ref6","first-page":"101","article-title":"Secure image steganography with blockchain for copyright protection","volume":"11","author":"Mathur","year":"2023","journal-title":"J. Cybersecur. Digit. Forensics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.02.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019168"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/sym11080996"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18280\/ts.410147"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2915584"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051222"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.102618"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908924"},{"key":"ref16","first-page":"1","article-title":"Hiding images in plain sight: Deep steganography","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Baluja"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108419"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955452"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27051-7_11"},{"key":"ref23","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref24","article-title":"Score-based generative modeling through stochastic differential equations","author":"Song","year":"2020","journal-title":"arXiv:2011.13456"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"ref26","first-page":"23593","article-title":"Denoising diffusion restoration models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Kawar"},{"key":"ref27","article-title":"Zero-shot image restoration using denoising diffusion null-space model","author":"Wang","year":"2022","journal-title":"arXiv:2212.00490"},{"key":"ref28","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"34","author":"Dhariwal"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i5.28226"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00170"},{"key":"ref32","article-title":"Prompt-to-prompt image editing with cross attention control","author":"Hertz","year":"2022","journal-title":"arXiv:2208.01626"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00246"},{"key":"ref35","article-title":"SDEdit: Guided image synthesis and editing with stochastic differential equations","author":"Meng","year":"2021","journal-title":"arXiv:2108.01073"},{"key":"ref36","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020","journal-title":"arXiv:2010.02502"},{"key":"ref37","article-title":"Advanced PVD-based steganography for secure communication","volume":"200","author":"Lin","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref38","first-page":"5181","article-title":"High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels","volume":"83","author":"Kang","year":"2023","journal-title":"Multimedia Tools Appl."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53842-1_9"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.26735\/16587790.2019.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/app8112199"},{"issue":"2","key":"ref42","first-page":"911","article-title":"Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons","volume":"43","author":"Al-Juaid","year":"2018","journal-title":"Arabian J. Sci. Eng."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"ref44","article-title":"SteganoGAN: High capacity image steganography with GANs","author":"Alex Zhang","year":"2019","journal-title":"arXiv:1901.03892"},{"key":"ref45","first-page":"10223","article-title":"UDH: Universal deep hiding for steganography, watermarking, and light field messaging","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Zhang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612514"},{"key":"ref47","article-title":"NICE: Non-linear independent components estimation","author":"Dinh","year":"2014","journal-title":"arXiv:1410.8516"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107105"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3151-8"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2019.102133"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105375"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00917-3"},{"issue":"1","key":"ref54","first-page":"29","article-title":"A coverless information hiding method based on constructing a complete grouped basis with unsupervised learning","volume":"6","author":"Lu","year":"2021","journal-title":"J. Netw. Intell."},{"key":"ref55","first-page":"1","article-title":"CRoSS: Diffusion model makes controllable, robust and secure image steganography","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Yu"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97909-0_46"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-022-02107-5"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030774"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28147"},{"key":"ref63","first-page":"2256","article-title":"Deep unsupervised learning using nonequilibrium thermodynamics","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Sohl-Dickstein"},{"key":"ref64","article-title":"An image is worth one word: Personalizing text-to-image generation using textual inversion","author":"Gal","year":"2022","journal-title":"arXiv:2208.01618"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01767"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01764"},{"key":"ref68","article-title":"Composer: Creative and controllable image synthesis with composable conditions","author":"Huang","year":"2023","journal-title":"arXiv:2302.09778"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/app10093135"},{"key":"ref70","first-page":"8798","article-title":"High-resolution image synthesis and semantic manipulation with conditional GANs","volume-title":"Proc. IEEE Int. Conf. Comput. Vis. (ICCV)","author":"Kr\u00e4henb\u00fchl"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref72","first-page":"12888","article-title":"BLIP: Bootstrapping language-image pre-training for unified vision-language understanding and generation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li"},{"key":"ref73","article-title":"SDXL: Improving latent diffusion models for high-resolution image synthesis","author":"Podell","year":"2023","journal-title":"arXiv:2307.01952"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref76","article-title":"StegExpose\u2014A tool for detecting LSB steganography","author":"Boehm","year":"2014","journal-title":"arXiv:1410.6656"},{"key":"ref77","article-title":"Destruction of image steganography using generative adversarial networks","author":"Corley","year":"2019","journal-title":"arXiv:1912.10070"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10713347.pdf?arnumber=10713347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T20:04:34Z","timestamp":1736885074000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10713347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3477469","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}