{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:36:14Z","timestamp":1771655774334,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297255","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"441-446","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Digital Cardan Grille"],"prefix":"10.1145","author":[{"given":"Jia","family":"Liu","sequence":"first","affiliation":[{"name":"Engineering University of PAP, Xi'an, China"}]},{"given":"Tanping","family":"Zhou","sequence":"additional","affiliation":[{"name":"Engineering University of PAP, Xi'an, China"}]},{"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Rocket Force Engineering University Xi'an, China"}]},{"given":"Yan","family":"Ke","sequence":"additional","affiliation":[{"name":"Engineering University of PAP, Xi'an, China"}]},{"given":"Yu","family":"Lei","sequence":"additional","affiliation":[{"name":"Engineering University of PAP, Xi'an, China"}]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Engineering University of PAP, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital Watermarking","author":"Sallee P.","unstructured":"Sallee , P. 2003. Model-Based Steganography . Digital Watermarking . Springer Berlin Heidelberg . Sallee, P. 2003. Model-Based Steganography. Digital Watermarking. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_4_1","volume-title":"Steganography in digital media: principles, algorithms, and applications {M}","author":"Fridrich J.","unstructured":"Fridrich J. 2010. Steganography in digital media: principles, algorithms, and applications {M} . Cambridge, UK : Cambridge University Press . Fridrich J. 2010. Steganography in digital media: principles, algorithms, and applications {M}. Cambridge, UK: Cambridge University Press."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73214-3_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Otori H. Kuriyama S.. 2009. Texture synthesis for mobile data communications. 29(6) 74--81.  Otori H. Kuriyama S.. 2009. Texture synthesis for mobile data communications. 29(6) 74--81.","DOI":"10.1109\/MCG.2009.127"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2371246"},{"key":"e_1_3_2_1_8_1","volume-title":"Robust Steganography Using Texture Synthesis. Advances in Intelligent Information Hiding and Multimedia Signal Processing","author":"Qian Z.","unstructured":"Qian , Z. , Zhou , H. , Zhang , W. , Zhang , X.. 2017. Robust Steganography Using Texture Synthesis. Advances in Intelligent Information Hiding and Multimedia Signal Processing . Springer International Publishing . Qian, Z., Zhou, H., Zhang, W., Zhang, X.. 2017. Robust Steganography Using Texture Synthesis. Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-014-1045-z"},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"527","article-title":"Coverless information hiding based on bag-of-words model of image","volume":"34","author":"Zhou Z. L.","year":"2016","unstructured":"Zhou , Z. L. , Cao , Y. , Sun , X. M. 2016 . Coverless information hiding based on bag-of-words model of image . Journal of Applied Sciences , 34 ( 5 ), 527 -- 536 . Zhou, Z. L., Cao, Y., Sun, X. M. 2016. Coverless information hiding based on bag-of-words model of image. Journal of Applied Sciences, 34(5), 527--536.","journal-title":"Journal of Applied Sciences"},{"key":"e_1_3_2_1_11_1","article-title":"Prospect of digital steganography research","author":"Zang X. P.","year":"2016","unstructured":"Zang , X. P. , Qian , Z. X. , Sheng , L. I. 2016 . Prospect of digital steganography research . Journal of Applied Sciences. Zang, X. P., Qian, Z. X., Sheng, L. I. 2016. Prospect of digital steganography research. Journal of Applied Sciences.","journal-title":"Journal of Applied Sciences."},{"key":"e_1_3_2_1_12_1","unstructured":"Abadi M. Andersen D. G. 2016.Learning to protect communications with adversarial neural cryptography. 15. DOI=http:\/\/research.google.com\/pubs\/pub45827.html  Abadi M. Andersen D. G. 2016.Learning to protect communications with adversarial neural cryptography. 15. DOI=http:\/\/research.google.com\/pubs\/pub45827.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Volkhonskiy D. Nazarov I. Borisenko B. Burnaev E. 2017. Steganographic generative adversarial networks. DOI=http:\/\/cn.arxiv.org\/pdf\/1703.05502  Volkhonskiy D. Nazarov I. Borisenko B. Burnaev E. 2017. Steganographic generative adversarial networks. DOI=http:\/\/cn.arxiv.org\/pdf\/1703.05502"},{"key":"e_1_3_2_1_14_1","unstructured":"Radford A. Metz L. Chintala S. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. Computer Science. DOI=https:\/\/arxiv.org\/abs\/1511.06434  Radford A. Metz L. Chintala S. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. Computer Science. DOI=https:\/\/arxiv.org\/abs\/1511.06434"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Shi H. Dong J. Wang W. Qian Y. Zhang X. 2017. Ssgan: secure steganography based on generative adversarial networks.  Shi H. Dong J. Wang W. Qian Y. Zhang X. 2017. Ssgan: secure steganography based on generative adversarial networks.","DOI":"10.1007\/978-3-319-77380-3_51"},{"key":"e_1_3_2_1_16_1","unstructured":"Hayes J. Danezis G. 2017. Generating steganographic images via adversarial training. DOI=https:\/\/arxiv.org\/abs\/1703.00371  Hayes J. Danezis G. 2017. Generating steganographic images via adversarial training. DOI=https:\/\/arxiv.org\/abs\/1703.00371"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_2_1_18_1","unstructured":"Ke Y. Zhang M. Liu J. Su T. Yang X. 2017. Generative steganography with kerckhoffs' principle based on generative adversarial networks. DOI=http:\/\/cn.arxiv.org\/pdf\/1711.04916  Ke Y. Zhang M. Liu J. Su T. Yang X. 2017. Generative steganography with kerckhoffs' principle based on generative adversarial networks. DOI=http:\/\/cn.arxiv.org\/pdf\/1711.04916"},{"key":"e_1_3_2_1_19_1","volume-title":"Tian Generative Information Hiding Method Based on Generative Adversarial Networks. Journal of Applied Sciences, 36(2), 27--36","author":"Liu M.","year":"2018","unstructured":"Liu , M. Liu , J. Zhang , M , Li , T. Tian Generative Information Hiding Method Based on Generative Adversarial Networks. Journal of Applied Sciences, 36(2), 27--36 ( 2018 ). DOI=https:\/\/arxiv.org\/abs\/1712.06951 Liu, M. Liu, J. Zhang, M, Li, T. Tian Generative Information Hiding Method Based on Generative Adversarial Networks. Journal of Applied Sciences, 36(2), 27--36 (2018). DOI=https:\/\/arxiv.org\/abs\/1712.06951"},{"key":"e_1_3_2_1_20_1","unstructured":"Odena A. Olah C. Shlens J. 2016. Conditional image synthesis with auxiliary classifier gans. DOI=https:\/\/arxiv.org\/abs\/1610.09585  Odena A. Olah C. Shlens J. 2016. Conditional image synthesis with auxiliary classifier gans. DOI=https:\/\/arxiv.org\/abs\/1610.09585"},{"key":"e_1_3_2_1_21_1","unstructured":"Yeh R. Chen C. Lim T. Y. Hasegawajohnson M. Do M. N. 2016. Semantic image inpainting with perceptual and contextual losses. DOI=https:\/\/arxiv.org\/abs\/1607.07539v2  Yeh R. Chen C. Lim T. Y. Hasegawajohnson M. Do M. N. 2016. Semantic image inpainting with perceptual and contextual losses. DOI=https:\/\/arxiv.org\/abs\/1607.07539v2"},{"key":"e_1_3_2_1_22_1","volume-title":"Labeled Faces in the Wild: A Survey. Advances in Face Detection and Facial Image Analysis","author":"Learned-Miller E.","unstructured":"Learned-Miller , E. , Huang , G. B. , Roychowdhury , A. , Li , H. , Hua , G. 2016. Labeled Faces in the Wild: A Survey. Advances in Face Detection and Facial Image Analysis . Springer International Publishing . Learned-Miller, E., Huang, G. B., Roychowdhury, A., Li, H., Hua, G. 2016. Labeled Faces in the Wild: A Survey. Advances in Face Detection and Facial Image Analysis. Springer International Publishing."},{"key":"e_1_3_2_1_23_1","unstructured":"Amos B. Image Completion with Deep Learning in TensorFlow. Available at https:\/\/github.com\/bamos\/dcgan-completion.tensorflow  Amos B. Image Completion with Deep Learning in TensorFlow. Available at https:\/\/github.com\/bamos\/dcgan-completion.tensorflow"}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","location":"Shenzhen China","acronym":"CSAI '18","sponsor":["Shenzhen University Shenzhen University"]},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297255"}},"subtitle":["A Modern Approach for Information Hiding"],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":23,"alternative-id":["10.1145\/3297156.3297255","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297255","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}