{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:16:06Z","timestamp":1773512166765,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T00:00:00Z","timestamp":1589414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T00:00:00Z","timestamp":1589414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1186\/s13640-020-00506-6","type":"journal-article","created":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T13:10:14Z","timestamp":1589461814000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A coverless steganography method based on generative adversarial network"],"prefix":"10.1186","volume":"2020","author":[{"given":"Xintao","family":"Duan","sequence":"first","affiliation":[]},{"given":"Baoxia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Daidou","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,14]]},"reference":[{"issue":"3","key":"506_CR1","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.patcog.2003.08.010","volume":"37","author":"S. Maniccam","year":"2004","unstructured":"S. Maniccam, N. Bourbakis, Lossless compression and information hiding in images. Pattern Recog.37(3), 475\u2013486 (2004).","journal-title":"Pattern Recog."},{"key":"506_CR2","doi-asserted-by":"crossref","unstructured":"J. J. Eggers, R. Baeuml, B. Girod, 4675. Communications approach to image steganographySecurity and Watermarking of Multimedia Contents IV. pp. 26\u201337 (2002).","DOI":"10.1117\/12.465284"},{"issue":"3","key":"506_CR3","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"Y. K. Lee","year":"2000","unstructured":"Y. K. Lee, L. H. Chen, High capacity image steganographic model. IEE Proc. Vis., Image and Signal Process.147(3), 288\u2013294 (2000).","journal-title":"IEE Proc. Vis., Image and Signal Process."},{"key":"506_CR4","doi-asserted-by":"crossref","unstructured":"F. A. Petitcolas, S. Katzenbeisser, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Books, vol. 28. pp. 95\u2013172 (2000).","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"506_CR5","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/ICCITechn.2011.6164800","volume-title":"14th International Conference on Computer and Information Technology (ICCIT 2011)","author":"S. M. Karim","year":"2011","unstructured":"S. M. Karim, M. S. Rahman, M. I. Hossain, in 14th International Conference on Computer and Information Technology (ICCIT 2011). A new approach for lsb based image steganography using secret key (IEEEDhaka, 2011), pp. 286\u2013291."},{"key":"506_CR6","first-page":"1","volume-title":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","author":"M. Mishra","year":"2014","unstructured":"M. Mishra, G. Tiwari, A. K. Yadav, in International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014). Secret communication using public key steganography (IEEEFlorida, 2014), pp. 1\u20135."},{"key":"506_CR7","first-page":"142","volume-title":"International Workshop on Information Hiding","author":"A. Kiayias","year":"2012","unstructured":"A. Kiayias, A. Russell, N. Shashidhar, in International Workshop on Information Hiding. Key-efficient steganography (SpringerBerkeley, 2012), pp. 142\u2013159."},{"issue":"1","key":"506_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1049\/ip-vis:20000104","volume":"147","author":"D. C. Wu","year":"2000","unstructured":"D. C. Wu, W. H. Tsai, Spatial-domain image hiding using image differencing. IEE Proc.-Vis., Image and Signal Process.147(1), 29\u201337 (2000).","journal-title":"IEE Proc.-Vis., Image and Signal Process."},{"key":"506_CR9","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/ICME.2007.4284881","volume-title":"2007 IEEE International Conference on Multimedia and Expo","author":"H. Yang","year":"2007","unstructured":"H. Yang, A. C. Kot, S. Rahardja, X. Jiang, in 2007 IEEE International Conference on Multimedia and Expo. High capacity data hiding for binary images in morphological wavelet transform domain (IEEEBeijing, 2007), pp. 1239\u20131242."},{"key":"506_CR10","unstructured":"P. Thitimajshima, Y. Thitimajshima, Y. Rangsanseri, in Proc. IEEE Region 10 Int. Conf. Electr. Electron. Technol. TENCON 2001 (Cat. No. 01CH37239), 1. Hiding confidential signature into digital images via frequency domain, (2001), pp. 246\u2013249."},{"issue":"3","key":"506_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C. K. Chan","year":"2004","unstructured":"C. K. Chan, L. M. Cheng, Hiding data in images by simple lsb substitution. Pattern Recognit.37(3), 469\u2013474 (2004).","journal-title":"Pattern Recognit."},{"key":"506_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"International Workshop on Information Hiding","author":"T. Pevny\u0300","year":"2010","unstructured":"T. Pevny\u0300, T. Filler, P. Bas, in International Workshop on Information Hiding. Using high-dimensional image models to perform highly undetectable steganography (SpringerBerlin, 2010), pp. 161\u2013177."},{"issue":"1","key":"506_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V. Holub","year":"2014","unstructured":"V. Holub, J. Fridrich, T. Denemark, Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur.2014(1), 1 (2014).","journal-title":"EURASIP J. Inf. Secur."},{"issue":"2","key":"506_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T. Pevny","year":"2010","unstructured":"T. Pevny, P. Bas, J. Fridrich, Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensic Secur.5(2), 215\u2013224 (2010).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"11","key":"506_CR15","doi-asserted-by":"publisher","first-page":"3341","DOI":"10.1109\/TCSVT.2018.2878026","volume":"29","author":"C. Qin","year":"2019","unstructured":"C. Qin, Q. Zhou, F. Cao, J. Dong, X. Zhang, Flexible lossy compression for selective encrypted image with image inpainting. IEEE Trans. Circ. Syst. Video Technol.29(11), 3341\u20133355 (2019).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"3","key":"506_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"C. Qin","year":"2018","unstructured":"C. Qin, P. Ji, C. C. Chang, J. Dong, X. Sun, Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE MultiMedia. 25(3), 36\u201348 (2018).","journal-title":"IEEE MultiMedia"},{"key":"506_CR17","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C. Qin","year":"2018","unstructured":"C. Qin, W. Zhang, F. Cao, X. Zhang, C. -C. Chang, Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Processing. 153:, 109\u2013122 (2018).","journal-title":"Signal Processing"},{"key":"506_CR18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1117\/12.465332","volume":"4675","author":"R. Chandramouli","year":"2002","unstructured":"R. Chandramouli, G. Li, N. D. Memon, Adaptive steganography. Proc. SPIE. 4675:, 69\u201378 (2002).","journal-title":"Proc. SPIE"},{"issue":"3","key":"506_CR19","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J. Fridrich","year":"2012","unstructured":"J. Fridrich, J. Kodovsky, Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensic Secur.7(3), 868\u2013882 (2012).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"12","key":"506_CR20","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V. Holub","year":"2013","unstructured":"V. Holub, J. Fridrich, Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensic Secur.8(12), 1996\u20132006 (2013).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"2","key":"506_CR21","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"Y. Ma","year":"2018","unstructured":"Y. Ma, X. Luo, X. Li, Z. Bao, Y. Zhang, Selection of rich model steganalysis features based on decision rough set a-positive region reduction. IEEE Trans. Circ. Syst. Video Technol.29(2), 336\u2013350 (2018).","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"506_CR22","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TMM.2019.2924576","volume":"22","author":"C. Yan","year":"2020","unstructured":"C. Yan, Y. Tu, X. Wang, Y. Zhang, X. Hao, Y. Zhang, Q. Dai, Stat: spatial-temporal attention mechanism for video captioning. IEEE Trans. Multimed.22(1), 229\u2013241 (2020).","journal-title":"IEEE Trans. Multimed."},{"key":"506_CR23","first-page":"1","volume":"Early Access","author":"C. Yan","year":"2020","unstructured":"C. Yan, B. Shao, H. Zhao, R. Ning, Y. Zhang, F. Xu, 3d room layout estimation from a single RGB image. IEEE Trans. Multimed.Early Access:, 1\u20131 (2020).","journal-title":"IEEE Trans. Multimed."},{"key":"506_CR24","doi-asserted-by":"crossref","unstructured":"C. Yan, B. Gong, Y. Wei, Y. Gao, Deep multi-view enhancement hashing for image retrieval. IEEE Trans Pattern Anal Mach Intell (2020).","DOI":"10.1109\/TPAMI.2020.2975798"},{"key":"506_CR25","unstructured":"I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, Y. Bengio. Generative adversarial nets. Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems (Montreal, 2014), pp. 2672\u20132680."},{"key":"506_CR26","unstructured":"I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, A. C. Courville. Improved training of Wasserstein GANs. Advances in Neural Information Processing Systems (State of California, 2017), pp. 5767\u20135777."},{"key":"506_CR27","unstructured":"M. Arjovsky, S. Chintala, L. Bottou, in International Conference on Machine Learning. Wasserstein generative adversarial networks (Sydney, 2017), pp. 214\u2013223."},{"issue":"2","key":"506_CR28","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y. Rubner","year":"2000","unstructured":"Y. Rubner, C. Tomasi, L. J. Guibas, The earth mover\u2019s distance as a metric for image retrieval. Int. J. Comp. Vision. 40(2), 99\u2013121 (2000).","journal-title":"Int. J. Comp. Vision"},{"issue":"4","key":"506_CR29","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.exmath.2011.06.005","volume":"29","author":"D. A. Edwards","year":"2011","unstructured":"D. A. Edwards, On the Kantorovich\u2013Rubinstein theorem. Expo. Math.29(4), 387\u2013398 (2011).","journal-title":"Expo. Math."},{"key":"506_CR30","unstructured":"K. Liu, Varying k-lipschitz constraint for generative adversarial networks. arXiv preprint arXiv:1803.06107 (2018)."},{"key":"506_CR31","unstructured":"G. B. Huang, M. Mattar, T. Berg, E. Learned-Miller, in 12th International Conference on Computer Vision. Attribute and simile classifiers for face verification (Kyoto, 2009), pp. 365\u2013372."},{"key":"506_CR32","first-page":"3730","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Z. Liu","year":"2015","unstructured":"Z. Liu, P. Luo, X. Wang, X. Tang, in Proceedings of the IEEE International Conference on Computer Vision. Deep learning face attributes in the wild (IEEESantiago, 2015), pp. 3730\u20133738."},{"key":"506_CR33","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/CVPR.2009.5206848","volume-title":"2009 IEEE Conference on Computer Vision and Pattern Recognition","author":"J. Deng","year":"2009","unstructured":"J. Deng, W. Dong, R. Socher, L. -J. Li, K. Li, L. Fei-Fei, in 2009 IEEE Conference on Computer Vision and Pattern Recognition. ImageNet: a large-scale hierarchical image database (IEEEMiami, 2009), pp. 248\u2013255."},{"issue":"12","key":"506_CR34","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","volume":"31","author":"J. Xu","year":"2015","unstructured":"J. Xu, X. Mao, X. Jin, A. Jaffer, S. Lu, L. Li, M. Toyoura, Hidden message in a deformation-based texture. Vis. Comput.31(12), 1653\u20131669 (2015).","journal-title":"Vis. Comput."},{"issue":"5","key":"506_CR35","first-page":"527","volume":"34","author":"Z. Zhou","year":"2016","unstructured":"Z. Zhou, Y. Cao, X. Sun, Coverless information hiding based on bag-of-words model of image. J. Appl. Sci.34(5), 527\u2013536 (2016).","journal-title":"J. Appl. Sci."},{"key":"506_CR36","doi-asserted-by":"publisher","first-page":"118586","DOI":"10.1109\/ACCESS.2019.2920313","volume":"7","author":"Z. Zhang","year":"2019","unstructured":"Z. Zhang, J. Liu, Y. Ke, Y. Lei, J. Li, M. Zhang, X. Yang, Generative steganography by sampling. IEEE Access. 7:, 118586\u2013118597 (2019).","journal-title":"IEEE Access"},{"key":"506_CR37","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"International Conference on Cloud Computing and Security","author":"Z. Zhou","year":"2015","unstructured":"Z. Zhou, H. Sun, R. Harit, X. Chen, X. Sun, in International Conference on Cloud Computing and Security. Coverless image steganography without embedding (Springer International PublishingNanjing, 2015), pp. 123\u2013132."},{"issue":"6","key":"506_CR38","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCG.2009.127","volume":"29","author":"H. Otori","year":"2009","unstructured":"H. Otori, S. Kuriyama, Texture synthesis for mobile data communications. IEEE Comput. Graph. Appl.29(6), 74\u201381 (2009).","journal-title":"IEEE Comput. Graph. Appl."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00506-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-020-00506-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00506-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T13:35:33Z","timestamp":1589463333000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00506-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,14]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["506"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00506-6","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,14]]},"assertion":[{"value":"19 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"18"}}