{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:43:26Z","timestamp":1772909006971,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2700900"],"award-info":[{"award-number":["2021YFB2700900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2062"],"award-info":[{"award-number":["U22B2062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172232"],"award-info":[{"award-number":["62172232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202234"],"award-info":[{"award-number":["62202234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Basic Research Programs--Natural Science Foundation","award":["BK20200039"],"award-info":[{"award-number":["BK20200039"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M741778"],"award-info":[{"award-number":["2023M741778"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tcsvt.2023.3348291","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T20:12:09Z","timestamp":1703880729000},"page":"6128-6143","source":"Crossref","is-referenced-by-count":16,"title":["Invisible and Steganalysis-Resistant Deep Image Hiding Based on One-Way Adversarial Invertible Networks"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7254-9276","authenticated-orcid":false,"given":"Xinjue","family":"Hu","sequence":"first","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4363-2521","authenticated-orcid":false,"given":"Zhangjie","family":"Fu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0827-9443","authenticated-orcid":false,"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]},{"given":"Yanyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3180806"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238575"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2021.167804","article-title":"High capacity steganography based on IWT using eight-way CVD andn-LSB ensuring secure communication","volume":"247","author":"Mandal","year":"2021","journal-title":"Optik"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.2080272"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3001122"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034936"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3104140"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3244094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref20","first-page":"1954","article-title":"Generating steganographic images via adversarial training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Hayes"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref22","article-title":"SteganoGAN: High capacity image steganography with GANs","author":"Zhang","year":"2019","journal-title":"arXiv:1901.03892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2896270"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3148406"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2881118"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2923980"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3250750"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2838334"},{"key":"ref29","first-page":"2069","article-title":"Hiding images in plain sight: Deep steganography","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Baluja"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11018-5_64"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5463"},{"key":"ref35","first-page":"10223","article-title":"UDH: Universal deep hiding for steganography, watermarking, and light field messaging","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Zhang"},{"key":"ref36","article-title":"NICE: Non-linear independent components estimation","author":"Dinh","year":"2014","journal-title":"arXiv:1410.8516"},{"key":"ref37","article-title":"Density estimation using real NVP","author":"Dinh","year":"2016","journal-title":"arXiv:1605.08803"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2936913"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6951-z"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01219-9_25"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2013.6599565"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref53","first-page":"3481","article-title":"Which training methods for GANs do actually converge?","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Mescheder"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref55","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sutton"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084302"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref61","article-title":"SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5 MB model size","author":"Iandola","year":"2016","journal-title":"arXiv:1602.07360"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/76\/10582818\/10376187.pdf?arnumber=10376187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T04:00:39Z","timestamp":1720152039000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10376187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":61,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2023.3348291","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}