{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T10:54:18Z","timestamp":1775559258732,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201233"],"award-info":[{"award-number":["62201233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61961022"],"award-info":[{"award-number":["61961022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100022957","name":"Double Thousand Plan of Jiangxi Province","doi-asserted-by":"publisher","award":["jxsq2023201118"],"award-info":[{"award-number":["jxsq2023201118"]}],"id":[{"id":"10.13039\/100022957","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Fund Program of Jiangxi Province","award":["20232ACB212004"],"award-info":[{"award-number":["20232ACB212004"]}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20224BAB212012"],"award-info":[{"award-number":["20224BAB212012"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20224BAB211002"],"award-info":[{"award-number":["20224BAB211002"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tnse.2024.3354941","type":"journal-article","created":{"date-parts":[[2024,1,16]],"date-time":"2024-01-16T18:23:47Z","timestamp":1705429427000},"page":"2951-2962","source":"Crossref","is-referenced-by-count":34,"title":["Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3098-4640","authenticated-orcid":false,"given":"Wenying","family":"Wen","sequence":"first","affiliation":[{"name":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6678-7515","authenticated-orcid":false,"given":"Haigang","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0574-2313","authenticated-orcid":false,"given":"Shuren","family":"Qi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8183-8435","authenticated-orcid":false,"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6946-3586","authenticated-orcid":false,"given":"Yuming","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102784"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3263921"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955452"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2009.127"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2371246"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50209-0_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2878290"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3137829"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01033-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-014-1045-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27051-7_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3217661"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3268843"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2876633"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2017.244"},{"key":"ref20","first-page":"7198","article-title":"Swapping autoencoder for deep image manipulation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Park","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7128-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2881118"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.08.022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2017409"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.09.050"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0420-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9328-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63856-0_27"},{"key":"ref29","first-page":"161","article-title":"Using high-dimensional image models to perform highly undetectable steganography","volume-title":"Proc. Int. Workshop Inf. Hiding","author":"Pevny","year":"2010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2135853"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09985-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.06.018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2016.7868593"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20080166"},{"key":"ref36","first-page":"110","article-title":"A comparison between using SIFT and SURF for characteristic region based image steganography","volume":"9","author":"Hamid","year":"2012","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"issue":"5","key":"ref39","first-page":"527","article-title":"Coverless information hiding based on bag-of-words model of image","volume":"34","author":"Zhou","year":"2016","journal-title":"J. Appl. Sci."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2283431"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/38.946629"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref45","first-page":"6626","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Heusel","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref47","article-title":"LSUN: Construction of a large-scale image dataset using deep learning with humans in the loop","author":"Yu","year":"2015"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2852771"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICACI.2018.8377566"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3001122"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3036727"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8083-3_34"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/10510356\/10400923.pdf?arnumber=10400923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T19:00:29Z","timestamp":1714762829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10400923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2024.3354941","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}