{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:32:01Z","timestamp":1768620721161,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/wacv45572.2020.9093489","type":"proceedings-article","created":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T03:41:09Z","timestamp":1589514069000},"page":"2152-2160","source":"Crossref","is-referenced-by-count":12,"title":["Self-Contained Stylization via Steganography for Reverse and Serial Style Transfer"],"prefix":"10.1109","author":[{"given":"Hung-Yu","family":"Chen","sequence":"first","affiliation":[]},{"given":"I-Sheng","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Chia-Ming","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Wei-Chen","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref11","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"European Conference on Computer Vision (ECCV)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-385510-7.00002-3"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70139-4","article-title":"Universal style transfer via feature transforms","author":"li","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref14","article-title":"Microsoft coco: Common objects in context","author":"lin","year":"2014","journal-title":"European Conference on Computer Vision (ECCV)"},{"key":"ref15","article-title":"Painter by numbers, wikiart","author":"nichol","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00860"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2508363.2508419"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2017.8227432"},{"key":"ref4","article-title":"Texture synthesis using convolutional neural networks","author":"gatys","year":"2015","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/383259.383296"},{"key":"ref6","article-title":"Information hiding using least significant bit steganography and cryptography","author":"gupta","year":"2012","journal-title":"International Journal of Modern Education and Computer Science (IJMECS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/383259.383295"},{"key":"ref7","article-title":"Generating steganographic images via adversarial training","author":"hayes","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"ref1","article-title":"Hiding images in plain sight: Deep steganography","author":"baluja","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00600"},{"key":"ref21","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref24","article-title":"A learned representation for artistic style","author":"vincent dumoulin","year":"2017","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref23","article-title":"Texture networks: Feed-forward synthesis of textures and stylized images","author":"ulyanov","year":"2016","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"event":{"name":"2020 IEEE Winter Conference on Applications of Computer Vision (WACV)","location":"Snowmass Village, CO, USA","start":{"date-parts":[[2020,3,1]]},"end":{"date-parts":[[2020,3,5]]}},"container-title":["2020 IEEE Winter Conference on Applications of Computer Vision (WACV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9087828\/9093261\/09093489.pdf?arnumber=9093489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:54Z","timestamp":1656602154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9093489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wacv45572.2020.9093489","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}