{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:08Z","timestamp":1776926348617,"version":"3.51.2"},"reference-count":34,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064901","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T08:07:11Z","timestamp":1752566831000},"page":"5733-5750","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Fixed Neural Network Image Steganography Based on Secure Diffusion Models"],"prefix":"10.32604","volume":"84","author":[{"given":"Yixin","family":"Tang","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peizheng","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Ya","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Fuqiang","family":"Di","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","author":"Simmons","year":"1984","journal-title":"Advances in cryptology"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","article-title":"Adaptive data hiding in edge areas of images with spatial LSB domain systems","volume":"3","author":"Yang","year":"2008","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref3","series-title":"2012 IEEE International Workshop on Information Forensics and Security (WIFS); 2012 Dec 2\u20135","first-page":"234","article-title":"Designing steganographic distortion using directional filters","author":"Holub"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","author":"Pevn\u00fd","year":"2010","journal-title":"Information hiding"},{"key":"ref5","first-page":"432","article-title":"Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation","volume":"185","author":"Chen","year":"2007","journal-title":"Appl Math Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans Image Process"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"68191E","DOI":"10.1117\/12.766754","author":"Puech","year":"2008","journal-title":"Security, forensics, steganography, and watermarking of multimedia contents X"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","author":"Zhang","year":"2011","journal-title":"IEEE Signal Process Lett"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","article-title":"Secure reversible image data hiding over encrypted domain via key modulation","volume":"26","author":"Zhou","year":"2016","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","article-title":"A novel image steganography method via deep convolutional generative adversarial networks","volume":"6","author":"Hu","year":"2018","journal-title":"IEEE Access"},{"key":"ref12","first-page":"2066","article-title":"Hiding images in plain sight: deep steganography","volume":"30","author":"Shumeet","year":"2017","journal-title":"Adv Neural Inform Process Syst"},{"key":"ref13","series-title":"Proceedings of the European Conference on Computer Vision (ECCV) Workshops","first-page":"723","article-title":"End-to-end trained cnn encoder-decoder networks for image steganography","author":"Rehman","year":"2018 Sep 8\u201314"},{"key":"ref14","first-page":"10223","article-title":"Udh: universal deep hiding for steganography, watermarking, and light field messaging","volume":"33","author":"Zhang","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref15","series-title":"2021 IEEE\/CVF International Conference on Computer Vision (ICCV); 2021 Oct 10\u201317","first-page":"4713","article-title":"HiNet: deep image hiding by invertible network","author":"Jing"},{"key":"ref16","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"7943","article-title":"Securing fixed neural network steganography","author":"Luo","year":"2023"},{"key":"ref17","series-title":"Proceedings of the 32nd ACM International Conference on Multimedia","first-page":"10238","article-title":"Cover-separable fixed neural network steganography via deep generative models","author":"Li","year":"2024"},{"key":"ref18","series-title":"International Conference on Learning Representations","article-title":"Fixed neural network steganography: train the images, not the network","author":"Kishore","year":"2022 Apr 25\u201329"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"4576","DOI":"10.1109\/TCSVT.2024.3515652","article-title":"StegMamba: distortion-free immune-cover for multi-image steganography with state space model","volume":"35","author":"Luo","year":"2025","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"128295","DOI":"10.1016\/j.neucom.2024.128295","article-title":"CAISFormer: channel-wise attention transformer for image steganography","volume":"603","author":"Zhou","year":"2024","journal-title":"Neurocomputing"},{"key":"ref21","first-page":"2249","article-title":"Cascaded diffusion models for high fidelity image generation","volume":"23","author":"Ho","year":"2022","journal-title":"J Mach Learn Res"},{"key":"ref22","series-title":"2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR); 2024 Jun 16\u201322","first-page":"27559","article-title":"Purified and unified steganographic network","author":"Li"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"4608","DOI":"10.1109\/TIP.2018.2839891","article-title":"FFDNet: toward a fast and flexible solution for CNN-based image denoising","volume":"27","author":"Zhang","year":"2018","journal-title":"IEEE Trans Image Process"},{"key":"ref24","series-title":"2015 IEEE International Conference on Computer Vision (ICCV); 2015 Dec 7\u201313","first-page":"1026","article-title":"Delving deep into rectifiers: surpassing human-level performance on ImageNet classification","author":"He"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Elgamal","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","article-title":"ImageNet large scale visual recognition challenge","volume":"115","author":"Russakovsky","year":"2015","journal-title":"Int J Comput Vis"},{"key":"ref27","series-title":"Computer Vision\u2014ECCV 2014: 13th European Conference","first-page":"740","article-title":"Microsoft COCO: commonobjects in context","author":"Lin","year":"2014 Sep 6\u201312"},{"key":"ref28","series-title":"2015 IEEE International Conference on Computer Vision (ICCV); 2015 Dec 7\u201313","first-page":"3730","article-title":"Deep learning face attributes in the wild","author":"Liu"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.32604\/cmc.2024.056742","article-title":"Constructive robust steganography algorithm based on style transfer","volume":"81","author":"Zhang","year":"2024","journal-title":"Comput Mater Continua"},{"key":"ref30","unstructured":"Boehm B. Stegexpose\u2014A tool for detecting LSB steganography. arXiv:1410.6656. 2014."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","article-title":"Deep learning hierarchical representations for image steganalysis","volume":"12","author":"Ye","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"7340","DOI":"10.1038\/s41598-025-92082-w","article-title":"Image steganalysis using active learning and hyperparameter optimization","volume":"15","author":"Li","year":"2025","journal-title":"Sci Rep"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"43013","DOI":"10.1109\/ACCESS.2025.3546510","article-title":"HSDetect-net: a fuzzy-based deep learning steganalysis framework to detect possible hidden data in digital images","volume":"13","author":"de la Croix","year":"2025","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1109\/TCSVT.2023.3298803","article-title":"Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing","volume":"34","author":"Hua","year":"2024","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_64901\/TSP_CMC_64901.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:34Z","timestamp":1776923134000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63146"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":34,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064901","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-02-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}