{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:06:31Z","timestamp":1750824391552,"version":"3.41.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2025A1515011601"],"award-info":[{"award-number":["2025A1515011601"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62261160653","62441237","62472199","U23B2023"],"award-info":[{"award-number":["62261160653","62441237","62472199","U23B2023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3103100"],"award-info":[{"award-number":["2022YFB3103100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Opening Project of MoE Key Laboratory of Information Technology","award":["2024ZD001"],"award-info":[{"award-number":["2024ZD001"]}]},{"name":"Guangdong Key Laboratory of Data Security and Privacy Preserving","award":["2023B1212060036"],"award-info":[{"award-number":["2023B1212060036"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3573669","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T17:13:10Z","timestamp":1748538790000},"page":"5952-5965","source":"Crossref","is-referenced-by-count":0,"title":["Robust Generative Steganography for Image Hiding Using Concatenated Mappings"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1185-3779","authenticated-orcid":false,"given":"Liyan","family":"Chen","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1402-4663","authenticated-orcid":false,"given":"Bingwen","family":"Feng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4068-1766","authenticated-orcid":false,"given":"Wei","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2140-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368364"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2982624"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJAACS.2024.10048413"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611920"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680824"},{"key":"ref9","first-page":"2066","article-title":"Hiding images in plain sight: Deep steganography","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Baluja"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3525089"},{"key":"ref15","article-title":"StegExpose\u2014A tool for detecting LSB steganography","author":"Boehm","year":"2014","journal-title":"arXiv:1410.6656"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548217"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i1.27776"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"ref22","first-page":"2234","article-title":"Improved techniques for training GANs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Salimans"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859628"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3217661"},{"key":"ref25","first-page":"10215","article-title":"Glow: Generative flow with invertible 1x1 convolutions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Kingma"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01156"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3444311"},{"key":"ref28","first-page":"80730","article-title":"CRoSS: Diffusion model makes controllable, robust and secure image steganography","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yu"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/175"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.124"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02044"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3334624"},{"key":"ref34","first-page":"1","article-title":"Denoising diffusion implicit models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02158"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref38","article-title":"UMAP: Uniform manifold approximation and projection for dimension reduction","author":"McInnes","year":"2018","journal-title":"arXiv:1802.03426"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.02.044"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3095072"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"volume-title":"Stable-diffusion-Prompts","year":"2022","author":"Santana","key":"ref43"},{"key":"ref44","first-page":"5775","article-title":"DPM-solver: A fast ODE solver for diffusion probabilistic model sampling in around 10 steps","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lu"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2426416"},{"key":"ref46","first-page":"6629","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Heusel"},{"key":"ref47","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Radford"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11018098.pdf?arnumber=11018098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:06:43Z","timestamp":1750748803000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11018098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3573669","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}