{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:55:30Z","timestamp":1757613330368,"version":"3.44.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2047","62450067","62462067"],"award-info":[{"award-number":["U22B2047","62450067","62462067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3570468","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T13:35:50Z","timestamp":1747316150000},"page":"5632-5647","source":"Crossref","is-referenced-by-count":0,"title":["Conditional Flow-Based Generative Steganography"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8879-0419","authenticated-orcid":false,"given":"Qing","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8852-6618","authenticated-orcid":false,"given":"Ping","family":"Wei","sequence":"additional","affiliation":[{"name":"National Pilot School of Software, Yunnan University, Yunnan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1622-0561","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0212-3501","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7589-9554","authenticated-orcid":false,"given":"Sheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-4623","authenticated-orcid":false,"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2881118"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00763-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2963764"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/math9212829"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053998"},{"key":"ref6","first-page":"666","article-title":"Electronic watermark","volume-title":"Proc. Conf. Digit. Image Comput., Technol. Appl.","author":"Tirkel"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2903432"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.12.038"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1117\/12.2559429"},{"key":"ref13","first-page":"1954","article-title":"Generating steganographic images via adversarial training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hayes"},{"article-title":"CycleGAN, a master of steganography","year":"2017","author":"Chu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"article-title":"SteganoGAN: High capacity image steganography with GANs","year":"2019","author":"Zhang","key":"ref16"},{"article-title":"Coverless information hiding based on generative adversarial networks","year":"2017","author":"Liu","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01033-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00234"},{"article-title":"NICE: Non-linear independent components estimation","year":"2014","author":"Dinh","key":"ref20"},{"article-title":"Density estimation using real NVP","year":"2016","author":"Dinh","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.127"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50209-0_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2878290"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010027"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04179-3_22"},{"issue":"57","key":"ref29","first-page":"1","article-title":"Normalizing flows for probabilistic modeling and inference","volume":"22","author":"Papamakarios","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2992934"},{"key":"ref31","first-page":"10236","article-title":"Glow: Generative flow with invertible 1x1 convolutions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Kingma"},{"key":"ref32","first-page":"2722","article-title":"Flow++: Improving flow-based generative models with variational dequantization and architecture design","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ho"},{"key":"ref33","first-page":"23968","article-title":"Densely connected normalizing flows","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Grci\u0107"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5940"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00662"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3217661"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859628"},{"article-title":"When provably secure steganography meets generative models","year":"2018","author":"Chen","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179287"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"article-title":"Neural machine translation by jointly learning to align and translate","year":"2014","author":"Bahdanau","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","year":"2017","author":"Xiao","key":"ref43"},{"issue":"4","key":"ref44","article-title":"Learning multiple layers of features from tiny images","volume-title":"Proc. Handbook Systemic Autoimmune Dis.","volume":"1","author":"Krizhevsky","year":"2009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"article-title":"LSUN: Construction of a large-scale image dataset using deep learning with humans in the loop","year":"2015","author":"Yu","key":"ref46"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2014.7084325"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548217"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013204"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/11005468.pdf?arnumber=11005468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:53:30Z","timestamp":1757012010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11005468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":52,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3570468","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}