{"id":"https://openalex.org/W4412536663","doi":"https://doi.org/10.1109/lsp.2025.3591404","title":"Cross-Domain Robust Image Steganography via Dual-Domain Enhancement Network","display_name":"Cross-Domain Robust Image Steganography via Dual-Domain Enhancement Network","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412536663","doi":"https://doi.org/10.1109/lsp.2025.3591404"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2025.3591404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3591404","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kun Li","orcid":"https://orcid.org/0009-0007-2087-0299"},"institutions":[{"id":"https://openalex.org/I4210139944","display_name":"Institute of Forensic Science","ror":"https://ror.org/04ry60e05","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210089256","https://openalex.org/I4210127390","https://openalex.org/I4210139944"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kun Li","raw_affiliation_strings":["Shanghai Key Laboratory of Forensic Medicine and Key Laboratory of Forensic Science, Ministry of Justice, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0007-2087-0299","affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Forensic Medicine and Key Laboratory of Forensic Science, Ministry of Justice, Shanghai, China","institution_ids":["https://openalex.org/I4210139944"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100749734","display_name":"Bin Ma","orcid":"https://orcid.org/0000-0002-9030-7393"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Ma","raw_affiliation_strings":["School of Qilu University of Technology, Jinan, China"],"raw_orcid":"https://orcid.org/0000-0002-9030-7393","affiliations":[{"raw_affiliation_string":"School of Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003269656","display_name":"Weike You","orcid":"https://orcid.org/0000-0002-2642-6005"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weike You","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-2642-6005","affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110851572","display_name":"Hong Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139944","display_name":"Institute of Forensic Science","ror":"https://ror.org/04ry60e05","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210089256","https://openalex.org/I4210127390","https://openalex.org/I4210139944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Guo","raw_affiliation_strings":["Shanghai Key Laboratory of Forensic Medicine and Key Laboratory of Forensic Science, Ministry of Justice, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Forensic Medicine and Key Laboratory of Forensic Science, Ministry of Justice, Shanghai, China","institution_ids":["https://openalex.org/I4210139944"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059744997","display_name":"Linna Zhou","orcid":"https://orcid.org/0009-0004-0727-2436"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linna Zhou","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210139944"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14866245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"32","issue":null,"first_page":"3127","last_page":"3131"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10688","display_name":"Image and Signal Denoising Methods","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6362502574920654},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.586862325668335},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5634668469429016},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5347147583961487},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47635698318481445},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47478076815605164},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.44930675625801086},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3557095527648926},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2204979658126831}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6362502574920654},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.586862325668335},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5634668469429016},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5347147583961487},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47635698318481445},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47478076815605164},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.44930675625801086},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3557095527648926},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2204979658126831},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lsp.2025.3591404","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2025.3591404","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2425701146","display_name":null,"funder_award_id":"62172053","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4019661527","display_name":null,"funder_award_id":"62302059","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1663899164","https://openalex.org/W1976570511","https://openalex.org/W2055625960","https://openalex.org/W2104705565","https://openalex.org/W2134527668","https://openalex.org/W2158320630","https://openalex.org/W2170598445","https://openalex.org/W2542290803","https://openalex.org/W2621048556","https://openalex.org/W2751202750","https://openalex.org/W2892948265","https://openalex.org/W2954612090","https://openalex.org/W2969585684","https://openalex.org/W3089337021","https://openalex.org/W3128117720","https://openalex.org/W3133932568","https://openalex.org/W4206425634","https://openalex.org/W4280607755","https://openalex.org/W4313639526","https://openalex.org/W4362654036","https://openalex.org/W4366504161","https://openalex.org/W4388283577","https://openalex.org/W4388837972","https://openalex.org/W4390422336","https://openalex.org/W4401386747","https://openalex.org/W4402593024","https://openalex.org/W4403294793"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W2352553236","https://openalex.org/W2990774877","https://openalex.org/W3093339210"],"abstract_inverted_index":{"Current":[0],"steganographic":[1,141],"techniques":[2],"predominantly":[3],"focus":[4],"on":[5],"single-domain":[6],"security":[7,52,146],"designs,":[8],"while":[9],"neglecting":[10],"the":[11,51,57,78,115,134],"fact":[12],"that":[13,30,133],"cross-domain":[14,126],"conversions":[15],"between":[16],"spatial":[17,58,72,96],"and":[18,28,53,59,73,103,128,147],"frequency":[19],"domains":[20],"may":[21],"compromise":[22],"embedded":[23],"features,":[24],"introducing":[25],"detectable":[26],"noise":[27],"artifacts":[29],"render":[31],"stego":[32,83],"images":[33],"vulnerable":[34],"to":[35,48,76,99,108,117],"steganalyzers.":[36],"This":[37,112],"letter":[38],"proposes":[39],"a":[40,66,87,95,104],"high-performance":[41],"image":[42,54,140],"steganography":[43],"by":[44],"dual-domain":[45,67],"adversarial":[46,68],"training":[47,69],"enhance":[49],"both":[50],"quality":[55],"in":[56,143],"JPEG":[60],"domains.":[61],"The":[62],"proposed":[63,135],"method":[64,136],"employs":[65],"strategy,":[70],"integrating":[71],"JPEG-domain":[74],"steganalyzers":[75],"guide":[77],"generator":[79],"toward":[80],"producing":[81],"compression-resilient":[82],"images.":[84],"In":[85],"addition,":[86],"dual-objective":[88],"loss":[89,98,107],"function":[90],"is":[91],"introduced,":[92],"consisting":[93],"of":[94,145],"fidelity":[97],"ensure":[100],"visual":[101],"imperceptibility":[102],"frequency-domain":[105],"consistency":[106],"mitigate":[109],"compression-induced":[110],"distortions.":[111],"design":[113],"enables":[114],"model":[116],"effectively":[118],"learn":[119],"domain-aware":[120],"embedding":[121],"strategies,":[122],"thereby":[123],"achieving":[124],"enhanced":[125],"robustness":[127],"security.":[129],"Extensive":[130],"experiments":[131],"demonstrate":[132],"outperforms":[137],"other":[138],"advanced":[139],"methods":[142],"terms":[144],"robustness.":[148]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
