{"id":"https://openalex.org/W7119667456","doi":"https://doi.org/10.1007/s44443-025-00456-x","title":"Controllable generative image steganography based on denoising diffusion implicit model","display_name":"Controllable generative image steganography based on denoising diffusion implicit model","publication_year":2026,"publication_date":"2026-01-10","ids":{"openalex":"https://openalex.org/W7119667456","doi":"https://doi.org/10.1007/s44443-025-00456-x"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00456-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00456-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-025-00456-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029276640","display_name":"Tian Wu","orcid":"https://orcid.org/0000-0001-5994-6069"},"institutions":[{"id":"https://openalex.org/I141649914","display_name":"Nanchang University","ror":"https://ror.org/042v6xz23","country_code":"CN","type":"education","lineage":["https://openalex.org/I141649914"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tian Wu","raw_affiliation_strings":["School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China","institution_ids":["https://openalex.org/I141649914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005508571","display_name":"Xuan Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I141649914","display_name":"Nanchang University","ror":"https://ror.org/042v6xz23","country_code":"CN","type":"education","lineage":["https://openalex.org/I141649914"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Hu","raw_affiliation_strings":["School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China","institution_ids":["https://openalex.org/I141649914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113686587","display_name":"ChunNian Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I141649914","display_name":"Nanchang University","ror":"https://ror.org/042v6xz23","country_code":"CN","type":"education","lineage":["https://openalex.org/I141649914"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunnian Liu","raw_affiliation_strings":["School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China","institution_ids":["https://openalex.org/I141649914"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122439221","display_name":"Ting Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I141649914","display_name":"Nanchang University","ror":"https://ror.org/042v6xz23","country_code":"CN","type":"education","lineage":["https://openalex.org/I141649914"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Liu","raw_affiliation_strings":["School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Public Policy and Administration, Nanchang University, 330031, Nanchang, China","institution_ids":["https://openalex.org/I141649914"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122461053","display_name":"Lina Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, 430072, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, 430072, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029276640"],"corresponding_institution_ids":["https://openalex.org/I141649914"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05502846,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.01269999984651804,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.79830002784729},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7322999835014343},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6722999811172485},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5428000092506409},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5328999757766724},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.460999995470047},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.42750000953674316},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4049000144004822},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.3971000015735626}],"concepts":[{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.79830002784729},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7322999835014343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6934999823570251},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6722999811172485},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6527000069618225},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5428000092506409},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5328999757766724},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.460999995470047},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.42750000953674316},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4049000144004822},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3971000015735626},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.39399999380111694},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.38999998569488525},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.3702999949455261},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.3522000014781952},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3330000042915344},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.3197999894618988},{"id":"https://openalex.org/C2983327147","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Image denoising","level":3,"score":0.31859999895095825},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30979999899864197},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30469998717308044},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3010999858379364},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.29589998722076416},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2558000087738037}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00456-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00456-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:88fd4a05ae0c4d4f85b0f571cad136b9","is_oa":true,"landing_page_url":"https://doaj.org/article/88fd4a05ae0c4d4f85b0f571cad136b9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 2 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00456-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00456-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6555319149","display_name":null,"funder_award_id":"2023YFB3106900","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"},{"id":"https://openalex.org/G8286278548","display_name":null,"funder_award_id":"62372334","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G958775773","display_name":null,"funder_award_id":"20252BAC200613","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W1976570511","https://openalex.org/W2070482985","https://openalex.org/W2117539524","https://openalex.org/W2134527668","https://openalex.org/W2751202750","https://openalex.org/W2794584741","https://openalex.org/W2892948265","https://openalex.org/W2900141423","https://openalex.org/W2961178835","https://openalex.org/W2985068832","https://openalex.org/W2995938787","https://openalex.org/W3046549894","https://openalex.org/W3085519426","https://openalex.org/W3107032263","https://openalex.org/W3211097205","https://openalex.org/W4225758314","https://openalex.org/W4281294190","https://openalex.org/W4312416962","https://openalex.org/W4312906123","https://openalex.org/W4366492959","https://openalex.org/W4366496658","https://openalex.org/W4366957336","https://openalex.org/W4385815557","https://openalex.org/W4387969350","https://openalex.org/W4400139096","https://openalex.org/W4401608840","https://openalex.org/W4407247376","https://openalex.org/W4411056855"],"related_works":[],"abstract_inverted_index":{"Generative":[0,49],"steganography":[1],"has":[2],"gained":[3],"significant":[4],"attention":[5],"due":[6],"to":[7,14,38,115],"its":[8],"cover-independent":[9],"nature,":[10],"which":[11],"allows":[12],"it":[13,95],"evade":[15],"a":[16,87,104],"broad":[17],"range":[18],"of":[19,131],"steganalysis":[20],"techniques.":[21],"However,":[22],"existing":[23,97,127],"methods":[24,98,128],"often":[25],"suffer":[26],"from":[27,96],"poor":[28],"extraction":[29,72,132],"accuracy":[30,73,133],"at":[31,75],"high":[32,76],"embedding":[33,77],"rates":[34],"and":[35,63,89,99,118,138],"limited":[36],"robustness":[37],"real-world":[39],"noise.":[40],"To":[41],"address":[42],"these":[43],"limitations,":[44],"we":[45],"propose":[46],"the":[47,59,64,112],"Controllable":[48],"Image":[50],"Steganography":[51],"(CGIS)":[52],"framework,":[53],"introducing":[54],"two":[55],"bidirectional":[56],"mapping":[57,62],"mechanisms:":[58],"Resampling-based":[60],"RS":[61],"Normal":[65],"Distribution-based":[66],"ND":[67],"mapping.":[68],"These":[69],"significantly":[70],"enhance":[71],"even":[74],"rates.":[78],"Unlike":[79],"prior":[80],"stochastic":[81],"or":[82],"training-dependent":[83],"approaches,":[84],"CGIS":[85,125],"utilizes":[86],"training-free":[88],"deterministic":[90],"diffusion":[91],"process,":[92],"fundamentally":[93],"distinguishing":[94],"ensuring":[100],"superior":[101,144],"robustness.":[102],"Additionally,":[103],"Gaussian":[105],"Mixture":[106],"Model-based":[107],"image":[108,139],"denoiser":[109],"(GMM-ID)":[110],"ensures":[111],"model\u2019s":[113],"resilience":[114],"network":[116],"noise":[117],"compression-induced":[119],"distortion.":[120],"Experimental":[121],"results":[122],"demonstrate":[123],"that":[124],"outperforms":[126],"in":[129],"terms":[130],"(97.75%),":[134],"detection":[135],"resistance":[136],"(96.23%),":[137],"distortion":[140],"(FID:":[141],"2.36),":[142],"demonstrating":[143],"performance":[145],"for":[146],"practical":[147],"deployment.":[148]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-10T00:00:00"}
