{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T13:40:10Z","timestamp":1772804410108,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736118"],"award-info":[{"award-number":["U1736118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072480"],"award-info":[{"award-number":["62072480"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19B2022"],"award-info":[{"award-number":["U19B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Areas Research and Development Program of Guangdong","award":["2019B010136002"],"award-info":[{"award-number":["2019B010136002"]}]},{"name":"Key Areas Research and Development Program of Guangdong","award":["2019B010139003"],"award-info":[{"award-number":["2019B010139003"]}]},{"name":"Key Project of Scientific Research Plan of Guangzhou","award":["201804020068"],"award-info":[{"award-number":["201804020068"]}]},{"DOI":"10.13039\/501100017622","name":"Shenzhen Research and Development Program","doi-asserted-by":"publisher","award":["GJHZ20180928155814437"],"award-info":[{"award-number":["GJHZ20180928155814437"]}],"id":[{"id":"10.13039\/501100017622","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/tcyb.2020.3026047","type":"journal-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T19:36:52Z","timestamp":1603481812000},"page":"5001-5014","source":"Crossref","is-referenced-by-count":8,"title":["Secure Halftone Image Steganography Based on Feature Space and Layer Embedding"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"first","affiliation":[{"name":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"}]},{"given":"Junjia","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"}]},{"given":"Junhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy, and the Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4487-6384","authenticated-orcid":false,"given":"Yicong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Macau, Macau, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2514110"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2010.14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2423678"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2587388"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2735989"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.8.001844"},{"issue":"2","key":"ref8","first-page":"75","article-title":"An adaptive algorithm for spatial grayscale","volume":"17","author":"Floyd","year":"1976","journal-title":"Proc. Soc. Inf. Display"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2470599"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1117\/12.135959"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2002.999680"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366228"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368364"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2903432"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2852702"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2434600"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756620"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2883082"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.06.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1411328.1411352"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref25","volume-title":"Pattern Recognition","author":"Theodoridis","year":"2009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.10.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12827-1_25"},{"key":"ref28","first-page":"1871","article-title":"LIBLINEAR: A library for large linear classification","volume":"9","author":"Fan","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3379500"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref31","first-page":"2611","article-title":"An optimum method for two-level rendition of continuous-tone pictures","volume-title":"Proc. IEEE Int. Commun. Conf.","author":"Bayer"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.66"},{"issue":"2","key":"ref33","first-page":"201","article-title":"Binary image steganalysis based on distortion level co-occurrence matrix","volume":"55","author":"Chen","year":"2018","journal-title":"et al.,"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.65"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2933621"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821600"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/97.995823"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9797898\/09238494.pdf?arnumber=9238494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:56:16Z","timestamp":1704844576000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9238494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":38,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2020.3026047","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}