{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:33:44Z","timestamp":1771490024600,"version":"3.50.1"},"reference-count":33,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060876","type":"journal-article","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T02:25:31Z","timestamp":1739499931000},"page":"1149-1171","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shenyan","family":"Han","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Daoyong","family":"Fu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"9428","DOI":"10.1109\/TCSVT.2024.3398222","article-title":"An iterative two-stage probability adjustment strategy with progressive incremental searching for image steganography","volume":"34","author":"Wang","year":"2024","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","article-title":"Robust coverless image steganography based on DCT and LDA topic classification","volume":"20","author":"Zhang","year":"2018","journal-title":"IEEE Trans Multimed"},{"key":"ref3","series-title":"2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","article-title":"RoSteALS: robust steganography using autoencoder latent space","author":"Bui","year":"2023 Jun 17\u201324"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"126945","DOI":"10.1016\/j.neucom.2023.126945","article-title":"A review of coverless steganography","volume":"566","author":"Meng","year":"2024","journal-title":"Neurocomputing"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4038","DOI":"10.1109\/TCSVT.2021.3108772","article-title":"A robust coverless steganography scheme using camouflage image","volume":"32","author":"Liu","year":"2022","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"105375","DOI":"10.1016\/j.knosys.2019.105375","article-title":"Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping","volume":"192","author":"Liu","year":"2020","journal-title":"Knowl Based Syst"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TNSE.2020.3041529","article-title":"Novel coverless steganography method based on image selection and StarGAN","volume":"9","author":"Chen","year":"2022","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref8","series-title":"The 8th International Symposium on Smart Graphics (SG)","article-title":"Data-embeddable texture synthesis","author":"Otori","year":"2007 Jun 25\u201327"},{"key":"ref9","first-page":"130","article-title":"Steganography using reversible texture synthesis","volume":"24","author":"Wu","year":"2014","journal-title":"IEEE Trans Image Process"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1007\/s00371-014-1045-z","article-title":"Hidden message in a deformation-based texture","volume":"31","author":"Xu","year":"2015","journal-title":"Vis Comput"},{"key":"ref11","first-page":"151","article-title":"Steganography using reversible texture synthesis based on seeded region growing and LSB","volume":"55","author":"Zhou","year":"2018","journal-title":"Comput Mater Contin"},{"key":"ref12","series-title":"The 10th IFIP TC 12 International Conference on Intelligent Information Processing (IIP)","article-title":"A texture synthesis steganography scheme based on super-pixel structure and SVM","author":"Wei","year":"2018 Oct 19\u201322"},{"key":"ref13","series-title":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","article-title":"A novel coverless information hiding technique using pattern image synthesis","author":"Lee","year":"2018 Nov 12\u201315"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","article-title":"Toward construction-based data hiding: from secrets to fingerprint images","volume":"28","author":"Li","year":"2019","journal-title":"IEEE Trans Image Process"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2050062","DOI":"10.1142\/S0218127420500625","article-title":"A coverless image information hiding algorithm based on fractal theory","volume":"30","author":"Zhang","year":"2020","journal-title":"Int J Bifurcation Chaos"},{"key":"ref16","unstructured":"Duan X, Song H. Coverless information hiding based on generative model. arXiv:1802.035282018. 2018. doi: 10.48550\/arXiv.1802.03528."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","article-title":"A novel image steganography method via deep convolutional generative adversarial networks","volume":"6","author":"Hu","year":"2018","journal-title":"IEEE Access"},{"key":"ref18","series-title":"Proceedings of the 30th ACM International Conference on Multimedia","article-title":"Generative steganography network","author":"Wei","year":"2022 Oct 10\u201314"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5817","DOI":"10.1109\/TCSVT.2022.3161419","article-title":"A robust coverless steganography based on generative adversarial networks and gradient descent approximation","volume":"32","author":"Peng","year":"2022","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"ref20","series-title":"2022 IEEE International Conference on Multimedia and Expo (ICME)","article-title":"Generative steganographic flow","author":"Wei","year":"2022 Jul 18\u201322"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"4118","DOI":"10.1109\/TDSC.2022.3217661","article-title":"Secret-to-image reversible transformation for generative steganography","volume":"20","author":"Zhou","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref22","unstructured":"Wei P, Zhou Q, Wang Z, Qian Z, Zhang X, Li S. Generative steganography diffusion. arXiv:2305.03472. 2023. doi: 10.48550\/arXiv.2305.03472."},{"key":"ref23","series-title":"Proceedings of the 31st ACM International Conference on Multimedia (ACM MM)","article-title":"StegaDDPM: generative image steganography based on denoising diffusion probabilistic model","author":"Peng","year":"2023 Oct 29\u2013Nov 3"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2751","DOI":"10.1109\/TIFS.2023.3268843","article-title":"Generative steganography via auto-generation of semantic object contours","volume":"18","author":"Zhou","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref25","series-title":"2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","article-title":"Image disentanglement autoencoder for steganography without embedding","author":"Liu","year":"2022 Jun 18\u201324"},{"key":"ref26","series-title":"2023 IEEE International Conference on Multimedia and Expo (ICME)","article-title":"A robust generative image steganography method based on guidance features in image synthesis","author":"Sun","year":"2023 Jul 10\u201314"},{"key":"ref27","series-title":"2017 IEEE International Conference on Computer Vision (ICCV)","article-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks","author":"Zhu","year":"2017 Oct 22\u201329"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/LSP.2012.2227726","article-title":"Making a \u201ccompletely blind\u201d image quality analyzer","volume":"20","author":"Mittal","year":"2013","journal-title":"IEEE Signal Process Lett"},{"key":"ref29","series-title":"The European Conference on Computer Vision (ECCV) Workshops","article-title":"The 2018 PIRM challenge on perceptual image super-resolution","author":"Blau","year":"2018 Sep 8\u201314"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"4695","DOI":"10.1109\/TIP.2012.2214050","article-title":"No-reference image quality assessment in the spatial domain","volume":"21","author":"Mittal","year":"2012","journal-title":"IEEE Trans Image Process"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/LSP.2016.2548421","article-title":"Structural design of convolutional neural networks for steganalysis","volume":"23","author":"Xu","year":"2016","journal-title":"IEEE Signal Process Lett"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","article-title":"Deep residual network for steganalysis of digital images","volume":"14","author":"Boroumand","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","article-title":"A Siamese CNN for image steganalysis","volume":"16","author":"You","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_60876\/TSP_CMC_60876.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:37:03Z","timestamp":1763102223000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060876","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}