{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:12:55Z","timestamp":1760346775629,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/apsipa.2018.8659716","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T23:34:55Z","timestamp":1552347295000},"page":"526-532","source":"Crossref","is-referenced-by-count":11,"title":["Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework"],"prefix":"10.23919","author":[{"given":"Hanqi","family":"Zi","sequence":"first","affiliation":[]},{"given":"Qiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Unsuper-vised representation learning with deep convolutional generative adversarial networks","year":"2015","author":"radford","key":"ref10"},{"key":"ref11","article-title":"Steganographic Generative Adversarial Networks","author":"volkhonskiy","year":"2016","journal-title":"Proc NIPS Workshop on Adversarial Training"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref13","article-title":"On Unifying Deep Generative Models","author":"hu","year":"2018","journal-title":"Proc International Conference on Learning Representations"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.299"},{"journal-title":"Face synthesis from visual attributes via sketch using conditional vaes and gans","year":"2018","author":"di","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"journal-title":"Empirical evaluation of rectified activations in convolutional network","year":"2015","author":"xu","key":"ref18"},{"journal-title":"How to train a GAN? tips and tricks to make GANs work","year":"0","author":"chintala","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","article-title":"Using high-dimensional image models to perform highly undetectable steganography","author":"pevny","year":"2010","journal-title":"Proc Workshop on Information Hiding"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","article-title":"Current status and key issues in image steganography: A survey","volume":"13?14 c","author":"subhedar","year":"2014","journal-title":"Computer Science Review"},{"key":"ref9","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Advances in Neural Information Processing Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2482513.2482965"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083248"},{"journal-title":"Tensorflow A system for large-scale machine learning","year":"2016","author":"abadi","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"journal-title":"Adam A method for stochastic optimization","year":"2014","author":"kingma","key":"ref24"},{"key":"ref23","first-page":"59","article-title":"Break our steganographic system&#x2014;The ins and outs of organizing BOSS","author":"filler","year":"2011","journal-title":"Proc Workshop on Information Hiding"},{"journal-title":"Auto-encoding variational bayes","year":"2014","author":"kingma","key":"ref26"},{"journal-title":"Lsun Construction of a large-scale image dataset using deep learning with humans in the loop","year":"2015","author":"yu","key":"ref25"}],"event":{"name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","start":{"date-parts":[[2018,11,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2018,11,15]]}},"container-title":["2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648538\/8659446\/08659716.pdf?arnumber=8659716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:19:54Z","timestamp":1598239194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8659716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/apsipa.2018.8659716","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}