{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:48:30Z","timestamp":1764175710298,"version":"3.38.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056742","type":"journal-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T06:58:31Z","timestamp":1727420311000},"page":"1433-1448","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":4,"title":["Constructive Robust Steganography Algorithm Based on Style Transfer"],"prefix":"10.32604","volume":"81","author":[{"given":"Xiong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xu\u2019an","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Fuqiang","family":"Di","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"273","article-title":"Survey of information security","volume":"50","author":"Shen","year":"Jun. 2007","journal-title":"Sci. China"},{"key":"ref2","first-page":"551","article-title":"Review of image steganalysis based on deep learning","volume":"32","author":"Chen","year":"Jun. 2021","journal-title":"J. Softw."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"7133","DOI":"10.1109\/TIFS.2024.3431888","article-title":"Audio multi-view spoofing detection framework based on audio-text-emotion correlations","volume":"19","author":"Wu","year":"Jul. 2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.26599\/TST.2024.9010114","article-title":"High-security HEVC video steganography method using the motion vector prediction index and motion vector difference","author":"Li","year":"Jan. 2024","journal-title":"Tsinghua Sci. Technol."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","article-title":"Adaptive data hiding in edge areas of images with spatial LSB domain systems","volume":"3","author":"Yang","year":"Aug. 2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref6","first-page":"1925","article-title":"Robust information hiding based on neural style transfer with artificial intelligence","volume":"79","author":"Zhang","year":"Apr. 2024","journal-title":"Comput. Mater. Contin."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"32855","DOI":"10.1007\/s11042-023-14797-0","article-title":"A blind and robust color image watermarking scheme based on DCT and DWT domains","volume":"82","author":"Mohammed","year":"Mar. 2023","journal-title":"Multimed. Tools Appl."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"7515","DOI":"10.1007\/s11042-019-08530-z","article-title":"Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain","volume":"79","author":"Tian","year":"Mar. 2020","journal-title":"Multimed. Tools Appl."},{"key":"ref9","unstructured":"M. Zhou et al., \u201cDeep fourier up-sampling,\u201d 2022, arXiv:2210.05171."},{"key":"ref10","series-title":"Int. Conf. Cloud Comput. Secur.","first-page":"123","article-title":"Coverless image steganography without embedding","volume":"9483","author":"Zhou","year":"May 2015"},{"key":"ref11","first-page":"527","article-title":"Coverless information hiding based on bag-of-words model of image","volume":"34","author":"Zhou","year":"Dec. 2016","journal-title":"J. Appl. Sci."},{"key":"ref12","first-page":"435","article-title":"Coverless image steganography based on SIFT and BOF","volume":"18","author":"Yuan","year":"Mar. 2017","journal-title":"J. Internet Technol."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","article-title":"Faster-RCNN based robust coverless information hiding system in cloud environment","volume":"7","author":"Zhou","year":"Nov. 2019","journal-title":"IEEE Access"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"43","DOI":"10.32604\/jihpp.2019.05797","article-title":"A novel steganography scheme combining coverless information hiding and steganography","volume":"1","author":"Meng","year":"Jan. 2019","journal-title":"J. Inf. Hiding Privacy Protection"},{"key":"ref15","first-page":"1179","article-title":"Dynamic content selection framework applied to coverless information hiding","volume":"19","author":"Cao","year":"Jul. 2018","journal-title":"J. Internet Technol."},{"key":"ref16","first-page":"1375","article-title":"GAN-GLS: Generative lyric steganography based on generative adversarial networks","volume":"69","author":"Wang","year":"Jun. 2021","journal-title":"Comput. Mater. Contin."},{"key":"ref17","first-page":"1","article-title":"Steganography in style transfer","author":"Shi","year":"Mar. 2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"ref18","series-title":"The 31st ACM Int. Conf. Multimed.","first-page":"6928","article-title":"Rethinking neural style transfer: Generating personalized and watermarked stylized images","author":"Wang","year":"Oct. 2023"},{"key":"ref19","article-title":"Semantic style transfer and turning two-bit doodles into fine artworks","author":"Champandard","year":"Mar. 2016","journal-title":"Comput. Res. Repos."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","article-title":"Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected CRFs","volume":"40","author":"Chen","year":"Apr. 2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref21","unstructured":"K. Simonyan and A. Zisserman, \u201cVery deep convolutional networks for large-scale image recognition,\u201d Apr. 2015, arXiv:1409.1556."},{"key":"ref22","series-title":"2009 IEEE Conf. Comput. Vis. Pattern Recognit.","first-page":"248","article-title":"ImageNet: A large-scale hierarchical image database","author":"Deng","year":"2009"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1956","DOI":"10.1007\/s11263-020-01316-z","article-title":"The open images dataset V4: Unified image classification, object detection, and visual relationship detection at scale","volume":"128","author":"Kuznetsova","year":"2020","journal-title":"Int. J. Comput. Vis."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2750","DOI":"10.1109\/TCSVT.2019.2923980","article-title":"Multiple robustness enhancements for image adaptive steganography in lossy channels","volume":"30","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref25","first-page":"2169","article-title":"Reversible image steganography scheme based on a U-Net structure","volume":"7","author":"Duan","year":"Jan. 2019","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ins.2020.12.002","article-title":"An encrypted coverless information hiding method based on generative models","volume":"553","author":"Li","year":"Dec. 2020","journal-title":"Inf. Sci."},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107481","article-title":"Improved image steganography based on super-pixel and coefficient-plane-selection","volume":"171","author":"Kadhim","year":"Jan. 2020, Art. no. 107481","journal-title":"Signal Process."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"135585","DOI":"10.1109\/ACCESS.2021.3113953","article-title":"End-to-end image steganography using deep convolutional autoencoders","volume":"9","author":"Subramanian","year":"Sep. 2021","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_56742\/TSP_CMC_56742.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T03:04:15Z","timestamp":1741316655000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056742","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-18","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}