{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:18:03Z","timestamp":1771658283641,"version":"3.50.1"},"reference-count":43,"publisher":"Zhejiang University Press","issue":"5","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1631\/fitee.2300762","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T11:49:20Z","timestamp":1748864960000},"page":"728-741","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer","SCFformer: \u4e00\u79cd\u57fa\u4e8e\u7a7a\u95f4\u901a\u9053\u878d\u5408 Transformer \u7684\u6297 JPEG \u538b\u7f29\u7684\u4e8c\u8fdb\u5236\u6570\u636e\u9690\u85cf\u65b9\u6cd5"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8757-2447","authenticated-orcid":false,"given":"Xintao","family":"Duan","sequence":"first","affiliation":[]},{"given":"Chun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bingxin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Guoming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Haewoon","family":"Nam","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v11i1.3279"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2019.2901877"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5635-z"},{"key":"ref4","author":"Boehm","year":"2014","journal-title":"StegExpose-a tool for detecting LSB steganography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2871749"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw59228.2023.00100"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5511-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2022.3141725"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/wifs.2012.6412644"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0271-y"},{"issue":"5","key":"ref11","first-page":"137","article-title":"Hybrid robust watermarking techniques based on DWT, DCT and SVD","volume":"2","author":"Harish","year":"2013","journal-title":"Int J Adv Electr Electron Eng"},{"key":"ref12","first-page":"1951","article-title":"Generating steganographic images via adversarial training","volume-title":"Proc 31st Int Conf on Neural Information Processing Systems","author":"Hayes","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417x-2014-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icpr.2010.579"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tmi.2022.3230943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/1715-2299"},{"issue":"17","key":"ref17","first-page":"39","article-title":"A novel steganography algorithm for hiding text in image using five modulus method","volume":"72","author":"Jassim","year":"2013","journal-title":"Int J Comput Appl"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.00469"},{"key":"ref19","author":"Kim","year":"2023","journal-title":"Diffusion-Stego: training-free diffusion generative steganography via message projection"},{"key":"ref20","first-page":"1","article-title":"Fixed neural network steganography: train the images, not the network","volume-title":"Proc 10th Int Conf on Learning Representations","author":"Kishore","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2018.2878290"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.05.053"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.00986"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.09.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2020.3027843"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583489"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103483"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.02165"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.03.037"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.03.006"},{"issue":"8","key":"ref31","first-page":"300","article-title":"A robust watermarking approach using DCT-DWT","volume":"2","author":"Singh","year":"2012","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2018.2881118"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548217"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2016.2548421"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2710946"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2017.2656380"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107343"},{"key":"ref38","first-page":"10223","article-title":"UDH: universal deep hiding for steganography, watermarking, and light field messaging","volume-title":"Proc 34th Conf on Neural Information Processing Systems","author":"Zhang","year":"2020"},{"key":"ref39","author":"Zhang","year":"2019","journal-title":"SteganoGAN: high capacity image steganography with GANs"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2015.53"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.02.058"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2885438"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300762.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2300762\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2300762.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:58:56Z","timestamp":1771657136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2300762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":43,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["2061"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2300762","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]},"assertion":[{"value":"8 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}