{"id":"https://openalex.org/W4413785488","doi":"https://doi.org/10.1109/tdsc.2025.3604222","title":"Provably Secure Generative Steganography Based on Adjustable Orthogonal Mapping","display_name":"Provably Secure Generative Steganography Based on Adjustable Orthogonal Mapping","publication_year":2025,"publication_date":"2025-08-28","ids":{"openalex":"https://openalex.org/W4413785488","doi":"https://doi.org/10.1109/tdsc.2025.3604222"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3604222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604222","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101776608","display_name":"Qinghua Zhang","orcid":"https://orcid.org/0000-0002-7565-0548"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinghua Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102934173","display_name":"Fangjun Huang","orcid":"https://orcid.org/0000-0002-8219-6056"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangjun Huang","raw_affiliation_strings":["School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shenzhen Campus of Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101776608"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27305582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"34","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7989277839660645},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7816735506057739},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4394170343875885},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.4193493127822876},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4154638648033142},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30991655588150024},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29317617416381836},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.18339630961418152}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7989277839660645},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7816735506057739},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4394170343875885},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.4193493127822876},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4154638648033142},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30991655588150024},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29317617416381836},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.18339630961418152}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3604222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604222","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1982471090","https://openalex.org/W2069314928","https://openalex.org/W2083610878","https://openalex.org/W2102166818","https://openalex.org/W2118296934","https://openalex.org/W2145447418","https://openalex.org/W2153531593","https://openalex.org/W2161439181","https://openalex.org/W2294087712","https://openalex.org/W2322622188","https://openalex.org/W2547937061","https://openalex.org/W2621048556","https://openalex.org/W2860433205","https://openalex.org/W2892948265","https://openalex.org/W2914062350","https://openalex.org/W2969585684","https://openalex.org/W2997526307","https://openalex.org/W3004040772","https://openalex.org/W3046549894","https://openalex.org/W3109641655","https://openalex.org/W3111585419","https://openalex.org/W3197689188","https://openalex.org/W3199177073","https://openalex.org/W3202396642","https://openalex.org/W4220945375","https://openalex.org/W4225758314","https://openalex.org/W4280607755","https://openalex.org/W4288775478","https://openalex.org/W4288804960","https://openalex.org/W4293518269","https://openalex.org/W4312416962","https://openalex.org/W4312438979","https://openalex.org/W4312933868","https://openalex.org/W4313229719","https://openalex.org/W4366492959","https://openalex.org/W4376865343","https://openalex.org/W4384948607","https://openalex.org/W4386158715","https://openalex.org/W4387969350","https://openalex.org/W4388283577","https://openalex.org/W4389609826","https://openalex.org/W4390906161","https://openalex.org/W4390908066","https://openalex.org/W4391430021","https://openalex.org/W4393154917","https://openalex.org/W4401213267","https://openalex.org/W4401608840","https://openalex.org/W4402039692","https://openalex.org/W4402727205","https://openalex.org/W4403792222","https://openalex.org/W4409076570","https://openalex.org/W4409906699"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2891774131","https://openalex.org/W3133799264","https://openalex.org/W2588780717","https://openalex.org/W1852022489"],"abstract_inverted_index":{"Generative":[0],"steganography":[1,47],"employs":[2,89],"generative":[3,42,46,81],"models":[4],"to":[5,91,114],"synthesize":[6],"stego":[7,118,125],"images":[8],"directly":[9],"from":[10,158],"secret":[11,94,143,196],"information,":[12,197],"avoiding":[13],"cover":[14],"image":[15,31,126,168],"modifications":[16],"required":[17],"in":[18,30,38,52,202,213],"traditional":[19],"steganography,":[20],"thereby":[21],"evading":[22],"detection":[23],"by":[24],"steganalytic":[25],"tools.":[26],"The":[27],"latest":[28],"advances":[29],"generation":[32,169],"technology":[33],"have":[34],"spurred":[35],"significant":[36,50],"progress":[37],"the":[39,87,93,97,102,111,121,124,129,133,136,142,146,150,154,161,171,191,194],"field":[40],"of":[41,54,135,149,193],"steganography.":[43],"Nevertheless,":[44],"existing":[45],"still":[48],"encounters":[49],"challenges":[51],"terms":[53],"provable":[55,180],"security,":[56,217],"robustness,":[57,218],"capacity,":[58,214],"and":[59,73,106,139,160,188,204,219],"visual":[60,215],"quality.":[61],"To":[62],"this":[63],"end,":[64],"we":[65],"construct":[66],"an":[67],"adjustable":[68,186],"orthogonal":[69],"mapping":[70,148],"(AOM)":[71],"framework,":[72],"based":[74],"on":[75],"it":[76,109],"propose":[77],"a":[78,116],"provably":[79],"secure":[80],"steganographic":[82],"method,":[83],"named":[84],"GSAOM.":[85],"Specifically,":[86],"sender":[88],"AOM":[90,159,183],"convert":[92],"information":[95,144],"into":[96,110,128],"latent":[98,130,155,162],"variable":[99,131,156,163],"that":[100,209],"follows":[101],"standard":[103,172],"normal":[104,173],"distribution":[105],"then":[107,140],"inputs":[108],"diffusion":[112,137],"model":[113],"generate":[115],"high-quality":[117],"image.":[119],"Correspondingly,":[120],"receiver":[122],"converts":[123],"back":[127],"through":[132],"inversion":[134],"model,":[138],"extracts":[141],"via":[145],"inverse":[147],"AOM.":[151],"Since":[152],"both":[153],"exported":[157],"randomly":[164],"generated":[165],"during":[166],"regular":[167],"follow":[170],"distribution,":[174],"our":[175],"proposed":[176],"GSAOM":[177,199,210],"can":[178,189],"achieve":[179],"security.":[181],"Additionally,":[182],"allows":[184],"for":[185],"capacity":[187,203],"maximize":[190],"distinguishability":[192],"extracted":[195],"endowing":[198],"with":[200],"advantages":[201],"robustness.":[205],"Extensive":[206],"experiments":[207],"demonstrate":[208],"performs":[211],"well":[212],"quality,":[216],"generalization.":[220]},"counts_by_year":[],"updated_date":"2026-01-19T04:01:09.351973","created_date":"2025-10-10T00:00:00"}
