{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:23:10Z","timestamp":1772043790034,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many scholars have applied various deep learning networks to the field of steganalysis to improve the accuracy of detection. The rapid improvement of the accuracy of steganalysis models has caused a huge threat to the security of steganography. In addition, another important factor that limits the security of steganography is capacity. The larger the capacity, the worse and more unnatural the visual quality of carrier images after embedded. Therefore, this paper proposes a steganography model\u2014HIGAN, which constructs the encoding network composed of residual blocks to hide the color secret image into another color image of the same size to output a lower distortion and higher visual quality steganographic image. Moreover, it utilizes the adversarial training between the encoder-decoder network and the steganalysis model to improve the ability to resist the detection of steganalysis models based on deep learning. The experimental results show that our proposed model is achievable and effective. Compared with the previous steganography model for hiding color images based on deep learning, the steganography model in this article could achieve steganographic images with higher visual quality and stronger security.<\/jats:p>","DOI":"10.1186\/s13640-020-00534-2","type":"journal-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T07:03:14Z","timestamp":1603782194000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["The secure steganography for hiding images via GAN"],"prefix":"10.1186","volume":"2020","author":[{"given":"Zhangjie","family":"Fu","sequence":"first","affiliation":[]},{"given":"Fan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2355-9010","authenticated-orcid":false,"given":"Xu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"issue":"7","key":"534_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F. A. Petitcolas","year":"1999","unstructured":"F. A. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding-a survey. Proc. IEEE. 87(7), 1062\u20131078 (1999).","journal-title":"Proc. IEEE"},{"key":"#cr-split#-534_CR2.1","unstructured":"Y. Qian, J. Dong, W. Wang, T. Tan, in Proceedings of Media Watermarking, Security, and Forensics 2015: 9-11 February 2015"},{"key":"#cr-split#-534_CR2.2","unstructured":"San Francisco, ed. by M. A. Adnan, D. M. Nasir, and D. H. Chad. Deep learning for steganalysis via convolutional neural networks (International Society for Optics and Photonics, 2015), pp. 171-180."},{"issue":"5","key":"534_CR3","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","volume":"23","author":"G. Xu","year":"2016","unstructured":"G. Xu, H. -Z. Wu, Y. -Q. Shi, Structural design of convolutional neural networks for steganalysis. IEEE Signal Proc. Lett.23(5), 708\u2013712 (2016).","journal-title":"IEEE Signal Proc. Lett."},{"issue":"11","key":"534_CR4","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J. Ye","year":"2017","unstructured":"J. Ye, J. Ni, Y. Yi, Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur.12(11), 2545\u20132557 (2017).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"534_CR5","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M. Boroumand","year":"2018","unstructured":"M. Boroumand, M. Chen, J. Fridrich, Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur.14(5), 1181\u20131193 (2018).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"534_CR6","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J. Fridrich","year":"2012","unstructured":"J. Fridrich, J. Kodovsky, Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur.7(3), 868\u2013882 (2012).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"#cr-split#-534_CR7.1","unstructured":"T. Denemark, V. Sedighi, V. Holub, R. Cogranne, J. Fridrich, in Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security: 3-5 December 2014"},{"key":"#cr-split#-534_CR7.2","unstructured":"Atlanta, ed. by Y. Sun, V. H. Zhao. Selection-channel-aware rich model for steganalysis of digital images (IEEE, 2014), pp. 48-53."},{"issue":"2","key":"534_CR8","first-page":"261","volume":"56","author":"Y. Yang","year":"2018","unstructured":"Y. Yang, Y. Chen, Y. Chen, W. Bi, A novel universal steganalysis algorithm based on the iqm and the srm. Comput. Mater. Continua. 56(2), 261\u2013272 (2018).","journal-title":"Comput. Mater. Continua"},{"issue":"3","key":"534_CR9","first-page":"483","volume":"55","author":"X. Duan","year":"2018","unstructured":"X. Duan, H. Song, C. Qin, M. K. Khan, Coverless steganography for digital images based on a generative model. Comput. Mater. and Continua. 55(3), 483\u2013493 (2018).","journal-title":"Comput. Mater. and Continua"},{"issue":"1","key":"534_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","volume":"2014","author":"V. Holub","year":"2014","unstructured":"V. Holub, J. Fridrich, T. Denemark, Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur.2014(1), 1 (2014).","journal-title":"EURASIP J. Inf. Secur."},{"key":"#cr-split#-534_CR11.1","unstructured":"V. Holub, J. Fridrich, in Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security: 2-5 December 2012"},{"key":"#cr-split#-534_CR11.2","unstructured":"Tenerife, ed. by P. Moulin, F. P\u00e9rez-Gonz\u00e1lez. Designing steganographic distortion using directional filters (IEEE, 2012), pp. 234-239."},{"key":"#cr-split#-534_CR12.1","unstructured":"B. Li, M. Wang, J. Huang, X. Li, in Proceedings of the 2014 IEEE International conference on Image Processing: 27-30 October 2014"},{"key":"#cr-split#-534_CR12.2","unstructured":"Paris, ed. by B. Pesquet-Popescu, J. Fowler. A new cost function for spatial image steganography (IEEE, 2014), pp. 4206-4210."},{"issue":"10","key":"534_CR13","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/LSP.2017.2745572","volume":"24","author":"W. Tang","year":"2017","unstructured":"W. Tang, S. Tan, B. Li, J. Huang, Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Proc. Lett.24(10), 1547\u20131551 (2017).","journal-title":"IEEE Signal Proc. Lett."},{"issue":"8","key":"534_CR14","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.1109\/TIFS.2019.2891237","volume":"14","author":"W. Tang","year":"2019","unstructured":"W. Tang, B. Li, S. Tan, M. Barni, J. Huang, CNN-based adversarial embedding for image steganography. IEEE Trans. Inf. Forensics Secur.14(8), 2074\u20132087 (2019).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"534_CR15","unstructured":"J. Yang, K. Liu, X. Kang, E. K. Wong, Y. -Q. Shi, Spatial image steganography based on generative adversarial network. arXiv preprint arXiv:1804.07939 (2018). http:\/\/arxiv.org\/abs\/1804.07939."},{"key":"534_CR16","unstructured":"K. A. Zhang, A. Cuesta-Infante, L. Xu, K. Veeramachaneni, SteganoGAN: high capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019). http:\/\/arxiv.org\/abs\/1901.03892."},{"key":"#cr-split#-534_CR17.1","unstructured":"S. Baluja, in Proceedings of Advances in Neural Information Processing Systems 30(NIPS 2017): 3-9 December 2017"},{"key":"#cr-split#-534_CR17.2","unstructured":"Long Beach, ed. by I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett. Hiding images in plain sight: deep steganography (Curran Associates, Inc, 2017), pp. 2069-2079."},{"key":"#cr-split#-534_CR18.1","unstructured":"A. Rehman, R. Rahim, S. Nadeem, S. Hussain, S. Roth, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018"},{"key":"#cr-split#-534_CR18.2","doi-asserted-by":"crossref","unstructured":"Munich, ed. by Leal-Taix\u00e9 L.End-to-end trained cnn encoder-decoder networks for image steganography (Springer International Publishing, 2019), pp. 723-729.","DOI":"10.1007\/978-3-030-11018-5_64"},{"key":"534_CR19","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X. Duan","year":"2019","unstructured":"X. Duan, K. Jia, B. Li, D. Guo, E. Zhang, C. Qin, Reversible image steganography scheme based on a U-Net structure. IEEE Access. 7:, 9314\u20139323 (2019).","journal-title":"IEEE Access"},{"issue":"7","key":"534_CR20","doi-asserted-by":"publisher","first-page":"8559","DOI":"10.1007\/s11042-018-6951-z","volume":"78","author":"R. Zhang","year":"2019","unstructured":"R. Zhang, S. Dong, J. Liu, Invisible steganography via generative adversarial networks. Multimed. Tools Appl.78(7), 8559\u20138575 (2019).","journal-title":"Multimed. Tools Appl."},{"key":"#cr-split#-534_CR21.1","unstructured":"I. Goodfellow, J. Pouget-Abadie, M. Mehdi, B. Xu, D. Warde-Farely, S. Ozair, A. Courvile, Y. Bengio, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018"},{"key":"#cr-split#-534_CR21.2","unstructured":"Munich, ed. by Z. Ghahramani, M. Welling, C. Cotes, N. D. Lawrence, and K. Q. Weinberger. Generative adversarial nets (Curran Associates, Inc., 2019), pp. 723-729."},{"key":"534_CR22","unstructured":"D. Volkhonskiy, B. Borisenko, E. Burnaev, Generative adversarial networks for image steganography (2016). https:\/\/openreview.net\/references\/pdf?id=HJODCvqex."},{"key":"#cr-split#-534_CR23.1","unstructured":"J. Hayes, G. Danezis, in Proceedings of Advances in Neural Information Processing Systems 30(NIPS 2017): 3-9 December 2017"},{"key":"#cr-split#-534_CR23.2","unstructured":"Long Beach, ed. by I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett. Generating steganographic images via adversarial training (Curran Associates, Inc., 2017), pp. 1954-1963."},{"issue":"1","key":"534_CR24","first-page":"1","volume":"55","author":"R. Meng","year":"2018","unstructured":"R. Meng, S. G. Rice, J. Wang, X. Sun, A fusion steganographic algorithm based on faster R-CNN. Comput. Mater. Continua. 55(1), 1\u201316 (2018).","journal-title":"Comput. Mater. Continua"},{"key":"#cr-split#-534_CR25.1","unstructured":"J. Zhu, R. Kaplan, J. Johnson, F. Li, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018"},{"key":"#cr-split#-534_CR25.2","unstructured":"Munich, ed. by V. Ferrari, M. Hebert, C. Sminchisescu, and Y. Weiss. Hidden: hiding data with deep networks (Springer International Publishing, 2018), pp. 657-672."},{"issue":"6","key":"534_CR26","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/fi10060054","volume":"10","author":"P. Wu","year":"2018","unstructured":"P. Wu, Y. Yang, X. Li, Stegnet: mega image steganography capacity with deep convolutional network. Future Internet. 10(6), 54 (2018).","journal-title":"Future Internet"},{"key":"#cr-split#-534_CR27.1","unstructured":"Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu, N. Yu, in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security: 20-22 June 2018"},{"key":"#cr-split#-534_CR27.2","unstructured":"Innsbruck, ed. by R. B\u00f6hme, C. Pasquini. Adversarial examples against deep neural network based steganalysis (Association for Computing Machinery, 2018), pp. 67-72."},{"key":"#cr-split#-534_CR28.1","unstructured":"J. Deng, W. Dong, R. Socher, L. -J. Li, K. Li, F. Li, in Proceedings of the 2009 IEEE Conference Vision and Pattern Recognition: 20-25 June 2009"},{"key":"#cr-split#-534_CR28.2","unstructured":"Miami, ed. by D. Huttenlcoher, G. Medioni, and J. Rehg. Imagenet: a large-scale hierarchical image database (IEEE, 2009), pp. 248-255."},{"issue":"4","key":"534_CR29","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z. Wang","year":"2004","unstructured":"Z. Wang, A. C. Bovik, H. R. Sheikh, E. P. Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process.13(4), 600\u2013612 (2004).","journal-title":"IEEE Trans. Image Process."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00534-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13640-020-00534-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-020-00534-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T23:38:21Z","timestamp":1635291501000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-020-00534-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["534"],"URL":"https:\/\/doi.org\/10.1186\/s13640-020-00534-2","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"5 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"46"}}