{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:32:07Z","timestamp":1773275527415,"version":"3.50.1"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020AAA0107400"],"award-info":[{"award-number":["2020AAA0107400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LR19F020004"],"award-info":[{"award-number":["LR19F020004"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific Technological Innovation Research Project by the Ministry of Education"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20222"],"award-info":[{"award-number":["U20A20222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ant-Zhejiang University Research Institute of FinTech"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tip.2021.3107999","type":"journal-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T20:18:48Z","timestamp":1630527528000},"page":"8567-8579","source":"Crossref","is-referenced-by-count":15,"title":["Multitask Identity-Aware Image Steganography via Minimax Optimization"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3083-1035","authenticated-orcid":false,"given":"Jiabao","family":"Cui","sequence":"first","affiliation":[]},{"given":"Pengyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Songyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liangli","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Cuizhu","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Jupeng","family":"Xia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3023-1662","authenticated-orcid":false,"given":"Xi","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"2545","article-title":"Deep learning hierarchical representations for image steganalysis","volume":"12 no","author":"ni","year":"2017","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref72","first-page":"61","article-title":"Attacks on steganographic systems","author":"westfeld","year":"1999","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1039052"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232466"},{"key":"ref76","first-page":"10223","article-title":"UDH: Universal deep hiding for steganography, watermarking, and light field messaging","volume":"33","author":"zhang","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461438"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2901877"},{"key":"ref38","first-page":"286","article-title":"Data hiding in images with adaptive numbers of least significant bits based on the human visual system","volume":"1","author":"lie","year":"1999","journal-title":"Proc Int Conf Image Process"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"ref32","first-page":"515","article-title":"P3: Toward privacy-preserving photo sharing","author":"ra","year":"2013","journal-title":"Proc 10th USENIX Symp Netw Syst Design Implement"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0047"},{"key":"ref30","article-title":"Defeating image obfuscation with deep learning","author":"mcpherson","year":"2016","journal-title":"arXiv 1609 00408"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.1529"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2015.3992"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1952-z"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/1687-4722-2012-25"},{"key":"ref60","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref63","first-page":"234","article-title":"U-Net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Proc Int Conf Med Image Comput Comput -Assist Intervent"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2018.8448772"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.184"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"ref67","article-title":"StegExpose&#x2013;a tool for detecting LSB steganography","author":"boehm","year":"2014","journal-title":"arXiv 1410 6656"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2493448"},{"key":"ref69","first-page":"355","article-title":"Detection of LSB steganography via sample pair analysis","author":"dumitrescu","year":"2002","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref20","first-page":"229","article-title":"Efficient privacy-preserving face recognition","author":"sadeghi","year":"2009","journal-title":"Proc Int Conf Inf Secur Cryptol"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E94.A.180"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Asia46551.2019.8942217"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2014.08.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref25","article-title":"Privacy-preserving machine learning using EtC images","volume":"11515","author":"kawamura","year":"2020","journal-title":"Proc SPIE"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"ref51","first-page":"723","article-title":"End-to-end trained CNN encoder-decoder networks for image steganography","author":"rahim","year":"2018","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00392"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22741-8_3"},{"key":"ref56","first-page":"1954","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6951-z"},{"key":"ref54","first-page":"534","article-title":"SSGAN: Secure steganography based on generative adversarial networks","author":"shi","year":"2017","journal-title":"Proc Pacific Rim Conf Multimedia"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1117\/12.2559429"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref10","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00767-6_35"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2014.7032863"},{"key":"ref13","article-title":"Block-wise scrambled image recognition using adaptation network","author":"madono","year":"2020","journal-title":"arXiv 2001 07761"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"ref15","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"gilad-bachrach","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn"},{"key":"ref16","article-title":"CryptoDL: Deep neural networks over encrypted data","author":"hesamifard","year":"2017","journal-title":"arXiv 1711 05189"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00121"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.225"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8350963"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909497"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662213"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2371246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.012"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref7","first-page":"2069","article-title":"Hiding images in plain sight: Deep steganography","author":"baluja","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"key":"ref9","article-title":"SteganoGAN: High capacity image steganography with GANs","author":"alex zhang","year":"2019","journal-title":"arXiv 1901 03892"},{"key":"ref46","first-page":"1542","article-title":"A high capacity information hiding algorithm in DCT domain","volume":"14","author":"quan","year":"2009","journal-title":"J Image Graph"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.822886"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2021544"},{"key":"ref43","first-page":"18","article-title":"Hiding an image inside another image using variable-rate steganography","volume":"4","author":"tamimi","year":"2013","journal-title":"Int J Adv Comput Sci Appl"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/83\/9263394\/09527131.pdf?arnumber=9527131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:51:04Z","timestamp":1652194264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/tip.2021.3107999","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}