{"id":"https://openalex.org/W4407937604","doi":"https://doi.org/10.1109/tcsvt.2025.3545067","title":"Coverless Image Steganography Based on Semantic-Controlled Text-to-Image Generation","display_name":"Coverless Image Steganography Based on Semantic-Controlled Text-to-Image Generation","publication_year":2025,"publication_date":"2025-02-25","ids":{"openalex":"https://openalex.org/W4407937604","doi":"https://doi.org/10.1109/tcsvt.2025.3545067"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2025.3545067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3545067","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100755903","display_name":"Li Xiao","orcid":"https://orcid.org/0000-0002-0287-4663"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiao Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-0287-4663","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030223441","display_name":"Liquan Chen","orcid":"https://orcid.org/0000-0002-7202-4939"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liquan Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-7202-4939","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045235047","display_name":"Tong Fu","orcid":"https://orcid.org/0000-0001-6292-8881"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Fu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6292-8881","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066341740","display_name":"Zhangjie Fu","orcid":"https://orcid.org/0000-0002-4363-2521"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhangjie Fu","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science and Technology, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-4363-2521","affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Ministry of Education, Engineering Research Center of Digital Forensics, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101726786","display_name":"Yuan Gao","orcid":"https://orcid.org/0000-0001-5351-6922"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Gao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100755903"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":3.3997,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.91351707,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"35","issue":"8","first_page":"8391","last_page":"8405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7309601306915283},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5894348621368408},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5738703608512878},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4445798397064209},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4121481776237488},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3538927435874939},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35135605931282043},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07593747973442078}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7309601306915283},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5894348621368408},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5738703608512878},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4445798397064209},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4121481776237488},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3538927435874939},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35135605931282043},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07593747973442078}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2025.3545067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3545067","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2259478128","display_name":null,"funder_award_id":"U22B2026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2009130368","https://openalex.org/W2294087712","https://openalex.org/W2738643374","https://openalex.org/W2804809630","https://openalex.org/W2860433205","https://openalex.org/W2901231491","https://openalex.org/W2995153684","https://openalex.org/W3046549894","https://openalex.org/W3096294610","https://openalex.org/W3109641655","https://openalex.org/W3119411117","https://openalex.org/W3182074013","https://openalex.org/W3197689188","https://openalex.org/W4205241294","https://openalex.org/W4205588087","https://openalex.org/W4206425634","https://openalex.org/W4225758314","https://openalex.org/W4285213468","https://openalex.org/W4288775478","https://openalex.org/W4312438979","https://openalex.org/W4312933868","https://openalex.org/W4313229719","https://openalex.org/W4362500847","https://openalex.org/W4387272116","https://openalex.org/W4387765998","https://openalex.org/W4387969350","https://openalex.org/W4392126508","https://openalex.org/W4393154917","https://openalex.org/W4400578941","https://openalex.org/W6640731111","https://openalex.org/W6779823529","https://openalex.org/W6783713337","https://openalex.org/W6850357939","https://openalex.org/W6853320337"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307"],"abstract_inverted_index":{"Artificial":[0],"Intelligence":[1],"Generated":[2],"Content":[3],"(AIGC)":[4],"has":[5],"created":[6],"a":[7,65,99,115],"fertile":[8],"ground":[9],"for":[10,39,48],"image":[11,21],"steganography.":[12],"Existing":[13],"Coverless":[14],"Image":[15],"Steganography":[16],"(CIS)":[17],"methods":[18,41],"rely":[19],"on":[20,69],"semantics":[22],"to":[23,148],"encode":[24],"secrets,":[25],"transmitting":[26],"stego":[27,139,150,154,185],"images":[28,155],"without":[29],"embedding,":[30],"inherently":[31],"resisting":[32],"steganalysis.":[33],"However,":[34],"constructing":[35],"CIS":[36,66],"Datasets":[37],"(CISDs)":[38],"these":[40,60,163],"demands":[42],"excessive":[43],"resources,":[44],"making":[45],"them":[46],"impractical":[47],"communication.":[49],"Moreover,":[50],"achieving":[51],"low":[52,193],"cost":[53],"and":[54,107,129,145,196],"high":[55],"security":[56],"is":[57,179],"unattainable":[58],"under":[59],"conditions.":[61],"Therefore,":[62],"we":[63],"propose":[64],"method":[67,74,178,191],"based":[68],"semantic-controlled":[70],"text-to-image":[71,85],"generation.":[72],"Our":[73],"disguises":[75],"users":[76],"as":[77],"typical":[78],"AIGC":[79],"community":[80],"members":[81],"utilizing":[82],"mainstream":[83],"black-box":[84],"generation":[86,168],"with":[87,98,167],"Stable":[88],"Diffusion":[89],"(SD).":[90],"During":[91],"pre-processing,":[92],"plain":[93],"prompts,":[94,131,176],"derived":[95],"from":[96,127,162,181],"dialogues":[97],"large":[100],"language":[101],"model,":[102],"are":[103,125,160],"divided":[104],"into":[105],"coded":[106,119,130],"uncoded":[108,128],"prompts":[109,124,147],"through":[110],"our":[111,138,177,190],"encryption":[112],"process,":[113],"where":[114],"secret":[116],"key":[117],"determines":[118],"prompts.":[120,186],"In":[121],"communication,":[122],"confusion":[123,146,175],"selected":[126],"excluding":[132],"those":[133],"determined":[134],"by":[135],"secrets.":[136],"Subsequently,":[137],"shuffling":[140],"process":[141],"combines":[142],"topic,":[143],"secret,":[144],"produce":[149],"prompt":[151],"sets.":[152],"Diverse":[153],"maintaining":[156],"visual":[157],"topic":[158],"consistency":[159],"generated":[161],"sets":[164],"using":[165],"SD":[166],"seeds":[169],"indicating":[170],"transmission":[171],"order.":[172],"By":[173],"introducing":[174],"secure":[180],"recognition":[182],"when":[183],"revealing":[184],"Experimental":[187],"results":[188],"demonstrate":[189],"achieves":[192],"communication":[194,198],"costs":[195],"enhances":[197],"security.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
