{"id":"https://openalex.org/W4415970887","doi":"https://doi.org/10.1109/tcsvt.2025.3629825","title":"GIANT: Generated Image Adversarial Steganography Based on Narrowed Targeting","display_name":"GIANT: Generated Image Adversarial Steganography Based on Narrowed Targeting","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415970887","doi":"https://doi.org/10.1109/tcsvt.2025.3629825"},"language":null,"primary_location":{"id":"doi:10.1109/tcsvt.2025.3629825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3629825","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101213274","display_name":"Zexin Fan","orcid":"https://orcid.org/0009-0001-6371-791X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zexin Fan","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0009-0001-6371-791X","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045121980","display_name":"Kejiang Chen","orcid":"https://orcid.org/0000-0002-9868-3414"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kejiang Chen","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-9868-3414","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089749839","display_name":"Yaofei Wang","orcid":"https://orcid.org/0000-0002-7765-9239"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]},{"id":"https://openalex.org/I39774598","display_name":"Hefei University","ror":"https://ror.org/01f5rdf64","country_code":"CN","type":"education","lineage":["https://openalex.org/I39774598"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaofei Wang","raw_affiliation_strings":["School of Coumputer Science and Information Engineering, Hefei University of Technology, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-7765-9239","affiliations":[{"raw_affiliation_string":"School of Coumputer Science and Information Engineering, Hefei University of Technology, Hefei, China","institution_ids":["https://openalex.org/I16365422","https://openalex.org/I39774598"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067689180","display_name":"Weiming Zhang","orcid":"https://orcid.org/0000-0001-5576-6108"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiming Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0001-5576-6108","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064573190","display_name":"Nenghai Yu","orcid":"https://orcid.org/0000-0003-4417-9316"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-4417-9316","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101213274"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31489254,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"36","issue":"4","first_page":"5671","last_page":"5682"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8787000179290771,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8787000179290771,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.0340999998152256,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.02419999986886978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8974999785423279},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8883000016212463},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.6572999954223633},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5794000029563904},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5529999732971191},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5091999769210815},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4964999854564667},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4620000123977661},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.42590001225471497}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8974999785423279},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8883000016212463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7114999890327454},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.6572999954223633},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5989999771118164},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5794000029563904},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5529999732971191},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5091999769210815},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4964999854564667},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.47909998893737793},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4620000123977661},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.42590001225471497},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4115999937057495},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.399399995803833},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3734999895095825},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.31200000643730164},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27720001339912415},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2639000117778778},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2581000030040741},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2025.3629825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2025.3629825","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2530813427","display_name":null,"funder_award_id":"PA2025IISL0104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3061771244","display_name":null,"funder_award_id":"62472398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4434355187","display_name":null,"funder_award_id":"62302146","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4538375728","display_name":null,"funder_award_id":"U2336206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6347247583","display_name":null,"funder_award_id":"U2436601","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,42,46,87,92,97,101,110,120,133,138,144,167,170,176,180,184,192],"rapid":[2],"emergence":[3],"of":[4,48,112,135,166],"various":[5],"generative":[6],"models,":[7,51],"generated":[8,37,77],"images":[9,38,78],"have":[10,52],"increasingly":[11],"become":[12],"a":[13,22,71,188],"prominent":[14],"data":[15],"medium":[16],"on":[17,34,68,85,137],"social":[18],"platforms,":[19],"making":[20],"up":[21],"significantly":[23,200],"higher":[24],"proportion":[25],"and":[26,41,95,115,142,154,191,206],"providing":[27],"fertile":[28],"ground":[29],"for":[30,36,76,163,211],"steganography.":[31],"However,":[32],"research":[33],"steganography":[35,66,74,102],"remains":[39],"limited,":[40],"distinctive":[43],"attributes,":[44],"especially":[45],"reproducibility":[47,111],"text-to-image":[49],"(TTI)":[50],"not":[53],"been":[54],"effectively":[55,214],"leveraged.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60],"propose":[61],"GIANT":[62,104,199],"(Generated":[63],"Image":[64],"Adversarial":[65],"based":[67],"Narrowed":[69],"Targeting),":[70],"novel":[72],"adversarial":[73,207],"framework":[75],"that":[79,198],"employs":[80],"narrowed":[81,106],"targeting":[82,107],"to":[83,99,131,158,182,204],"focus":[84],"embedding":[86],"secret":[88],"message":[89],"solely":[90],"in":[91],"secure":[93,168],"region":[94],"synchronizing":[96],"position":[98],"enhance":[100],"security.":[103],"achieves":[105],"by":[108,127,151],"leveraging":[109],"TTI":[113],"models":[114],"fusing":[116],"two":[117],"regions:":[118],"(1)":[119],"minimal":[121],"distortion":[122,130],"region,":[123,147,169],"which":[124,148],"is":[125,149],"localized":[126,150],"measuring":[128],"steganographic":[129,208],"evaluate":[132],"impact":[134],"modifications":[136],"cover":[139,185],"image":[140,186],"distribution,":[141],"(2)":[143],"critical":[145],"attention":[146,156],"using":[152,187],"coarse-grained":[153],"fine-grained":[155],"maps":[157],"evade":[159],"steganalysis":[160],"detection.":[161],"Additionally,":[162],"positional":[164],"synchronization":[165],"related":[171],"prompts":[172],"are":[173],"transmitted":[174],"alongside":[175],"stego":[177],"image,":[178],"allowing":[179],"receiver":[181],"reconstruct":[183],"shared":[189],"key":[190],"provided":[193],"prompt.":[194],"Experimental":[195],"results":[196],"demonstrate":[197],"improves":[201],"security":[202],"compared":[203],"conventional":[205],"methods":[209],"designed":[210],"natural":[212],"images,":[213],"countering":[215],"state-of-the-art":[216],"steganalyzers.":[217]},"counts_by_year":[],"updated_date":"2026-04-07T06:01:17.266235","created_date":"2025-11-06T00:00:00"}
