{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:13:42Z","timestamp":1771467222796,"version":"3.50.1"},"reference-count":34,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054542","type":"journal-article","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T07:16:26Z","timestamp":1728717386000},"page":"3221-3240","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":5,"title":["A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography"],"prefix":"10.32604","volume":"81","author":[{"given":"Jiajun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Lina","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weijin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","article-title":"Adaptive data hiding in edge areas of images with spatial LSB domain systems","volume":"3","author":"Yang","year":"2008","journal-title":"IEEE Trans. Inform. Forensic. Secur."},{"key":"ref2","series-title":"2007 IEEE Int. Conf. Electro\/Inform. Technol.","first-page":"178","article-title":"Strange fourier steganography in movies","author":"Mckeon","year":"2007"},{"key":"ref3","first-page":"142","article-title":"A new transform domain steganography based on modified logistic chaotic map for color images","volume":"34","author":"Valandar","year":"2017","journal-title":"J. Inform. Secur. Appl."},{"key":"ref4","series-title":"Proc. 3rd IEEE Int. Conf. Image Process.","first-page":"243","article-title":"Secure spread spectrum watermarking for images, audio and video","volume":"3","author":"Cox","year":"1996"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","article-title":"An efficient watermarking method based on significant difference of wavelet coefficient quantization","volume":"10","author":"Lin","year":"2008","journal-title":"IEEE Trans. Multimed."},{"key":"ref6","series-title":"Cloud Comput. Secur.: First Int. Conf., ICCCS 2015","article-title":"Coverless image steganography without embedding","author":"Zhou","year":"Aug. 13\u201315, 2015"},{"key":"ref7","series-title":"Intell. Comput. Methodol.: 13th Int. Conf., ICIC 2017","article-title":"Coverless information hiding based on robust image hashing","author":"Zheng","year":"Aug. 7\u201310, 2017"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"7965","DOI":"10.1007\/s11042-018-6444-0","article-title":"A novel coverless information hiding method based on the average pixel value of the sub-images","volume":"78","author":"Zou","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","article-title":"Robust coverless image steganography based on DCT and LDA topic classification","volume":"20","author":"Zhang","year":"Dec. 2018","journal-title":"IEEE Trans. Multimed."},{"key":"ref10","article-title":"Coverless steganography based on image retrieval of densenet features and dwt sequence mapping","volume":"192","author":"Liu","year":"2019, Art. no. 105375","journal-title":"Knowl.-Based Syst."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"603","DOI":"10.13164\/re.2023.0603","article-title":"Coverless steganography based on low similarity feature selection in DCT domain","volume":"32","author":"Tan","year":"2023","journal-title":"Radioengineering"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"6597","DOI":"10.1109\/JIOT.2021.3113872","article-title":"Distributed resource scheduling for large-scale MEC systems: A multiagent ensemble deep reinforcement learning with imitation acceleration","volume":"9","author":"Jiang","year":"May 1, 2022","journal-title":"IEEE Internet Things J."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2779","DOI":"10.1109\/TCSVT.2020.3033945","article-title":"Coverless image steganography based on multi-object recognition","volume":"31","author":"Luo","year":"Jul. 2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1186\/s13640-020-00521-7","article-title":"Coverless image steganography based on densenet feature mapping","volume":"2020","author":"Liu","year":"2020","journal-title":"EURASIP J. Image Video Process."},{"key":"ref15","series-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"4700","article-title":"Densely connected convolutional networks","author":"Huang","year":"2017"},{"key":"ref16","first-page":"1281","article-title":"Coverless image steganography based on image segmentation","volume":"64","author":"Luo","year":"2020","journal-title":"Comput. Mater. Contin."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4038","DOI":"10.1109\/TCSVT.2021.3108772","article-title":"A robust coverless steganography scheme using camouflage image","volume":"32","author":"Liu","year":"Jun. 2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111873","article-title":"Robust coverless image steganography based on human pose estimation","volume":"296","author":"Tan","year":"2024, Art. no. 111873","journal-title":"Knowl.-Based Syst."},{"key":"ref19","first-page":"2672","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Neural Inform. Process. Syst."},{"key":"ref20","unstructured":"M. M. Liu, M. Q. Zhang, J. Liu, Y. N. Zhang, and Y. Ke, \u201cCoverless information hiding based on generative adversarial networks,\u201d 2017, arXiv:1712.06951."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.3390\/sym11091152","article-title":"An image style transfer network using multilevel noise encoding and its application in coverless steganography","volume":"11","author":"Zhang","year":"2019, Art. no. 1152","journal-title":"Symmetry"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","article-title":"Novel coverless steganography method based on image selection and stargan","volume":"9","author":"Chen","year":"Jan.\u2013Feb. 1, 2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","article-title":"Distinctive image features from scale-invariant keypoints","volume":"60","author":"Lowe","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref24","series-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","first-page":"8789","article-title":"StarGAN: Unified generative adversarial networks for multi-domain image-to-image translation","author":"Choi","year":"2018"},{"key":"ref25","series-title":"2021 Int. Joint Conf. Neural Netw. (IJCNN)","first-page":"1","article-title":"Message drives image: A coverless image steganography framework using multi-domain image translation","author":"Xue","year":"2021"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"5817","DOI":"10.1109\/TCSVT.2022.3161419","article-title":"A robust coverless steganography based on generative adversarial networks and gradient descent approximation","volume":"32","author":"Peng","year":"Sep. 2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2951","DOI":"10.1109\/TNSE.2024.3354941","article-title":"Joint coverless steganography and image transformation for covert communication of secret messages","volume":"11","author":"Wen","year":"May\u2013Jun. 2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123420","article-title":"Leveraging coverless image steganography to hide secret information by generating anime characters using GAN","volume":"248","author":"Rehman","year":"2024, Art. no. 123420","journal-title":"Expert. Syst. Appl."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2022.108908","article-title":"Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)","volume":"206","author":"Setiadi","year":"2023, Art. no. 108908","journal-title":"Signal Process"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/3065386","article-title":"ImageNet classification with deep convolutional neural networks","volume":"60","author":"Krizhevsky","year":"2017","journal-title":"Commun ACM"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/s12559-019-09667-7","article-title":"How deep should be the depth of convolutional neural networks: A backyard dog case study","volume":"12","author":"Gorban","year":"2020","journal-title":"Cognit. Comput."},{"key":"ref32","first-page":"12993","article-title":"Distance-IoU loss: Faster and better learning for bounding box regression","volume":"34","author":"Zheng","year":"Apr. 2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"80804","DOI":"10.1109\/ACCESS.2022.3195901","article-title":"Solar cell surface defect detection based on improved YOLO v5","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","article-title":"Faster-RCNN based robust coverless information hiding system in cloud environment","volume":"7","author":"Zhou","year":"2019","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_54542\/TSP_CMC_54542.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:00:44Z","timestamp":1741320044000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054542","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}