{"id":"https://openalex.org/W4410852828","doi":"https://doi.org/10.1109/tifs.2025.3573669","title":"Robust Generative Steganography for Image Hiding Using Concatenated Mappings","display_name":"Robust Generative Steganography for Image Hiding Using Concatenated Mappings","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410852828","doi":"https://doi.org/10.1109/tifs.2025.3573669"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3573669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3573669","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100772867","display_name":"Liyan Chen","orcid":"https://orcid.org/0009-0007-2101-4793"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liyan Chen","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072124687","display_name":"Bingwen Feng","orcid":"https://orcid.org/0000-0003-1402-4663"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingwen Feng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005319671","display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","Engineering Research Center of Trustworthy AI, Ministry of Education, College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Engineering Research Center of Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]},{"raw_affiliation_string":"Engineering Research Center of Trustworthy AI, Ministry of Education, College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["School of Computer Science and Engineering, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100772867"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10095928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"5952","last_page":"5965"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8460967540740967},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6850764751434326},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.5445547103881836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4982750415802002},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.496963769197464},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.45994657278060913},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.42336374521255493},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.39082998037338257}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8460967540740967},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6850764751434326},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.5445547103881836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4982750415802002},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.496963769197464},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.45994657278060913},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.42336374521255493},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.39082998037338257}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3573669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3573669","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G228428193","display_name":null,"funder_award_id":"62472199","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2428307698","display_name":null,"funder_award_id":"2022YFB3103100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2434235226","display_name":null,"funder_award_id":"62261160653","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3468347914","display_name":null,"funder_award_id":"2025A1515011601","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7263650625","display_name":null,"funder_award_id":"U23B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7750792420","display_name":null,"funder_award_id":"62441237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1901129140","https://openalex.org/W1969748380","https://openalex.org/W1977182282","https://openalex.org/W1977725648","https://openalex.org/W2010867994","https://openalex.org/W2077774758","https://openalex.org/W2133665775","https://openalex.org/W2134527668","https://openalex.org/W2150593711","https://openalex.org/W2158320630","https://openalex.org/W2322622188","https://openalex.org/W2892948265","https://openalex.org/W2962770929","https://openalex.org/W3013708462","https://openalex.org/W3035574324","https://openalex.org/W3180275512","https://openalex.org/W3180355996","https://openalex.org/W3182074013","https://openalex.org/W4205588087","https://openalex.org/W4214543711","https://openalex.org/W4225758314","https://openalex.org/W4283069757","https://openalex.org/W4288804960","https://openalex.org/W4293518269","https://openalex.org/W4312416962","https://openalex.org/W4312906123","https://openalex.org/W4312933868","https://openalex.org/W4386076273","https://openalex.org/W4386875907","https://openalex.org/W4388820247","https://openalex.org/W4390871668","https://openalex.org/W4393154917","https://openalex.org/W4401025006","https://openalex.org/W4401608840","https://openalex.org/W4402727205","https://openalex.org/W4403791704","https://openalex.org/W4406014872","https://openalex.org/W6640731111","https://openalex.org/W6718379498","https://openalex.org/W6746523225","https://openalex.org/W6748816842","https://openalex.org/W6752910514","https://openalex.org/W6765779288","https://openalex.org/W6783713337","https://openalex.org/W6791353385","https://openalex.org/W6838327568","https://openalex.org/W6853320337"],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W83713408","https://openalex.org/W2497446005","https://openalex.org/W3203504906","https://openalex.org/W2171676767"],"abstract_inverted_index":{"Generative":[0],"steganography":[1,47],"stands":[2],"as":[3,118],"a":[4,23,32,44,75,91,99,121],"promising":[5],"technique":[6],"for":[7,49,120],"information":[8],"hiding,":[9],"primarily":[10],"due":[11],"to":[12,16,70,85],"its":[13,20],"remarkable":[14],"resistance":[15],"steganalysis":[17],"detection.":[18],"Despite":[19],"potential,":[21],"hiding":[22,50],"secret":[24],"image":[25,73,143,153],"using":[26],"existing":[27],"generative":[28,46],"steganographic":[29],"models":[30],"remains":[31],"challenge,":[33],"especially":[34],"in":[35],"lossy":[36],"or":[37],"noisy":[38],"communication":[39],"channels.":[40],"This":[41,112],"paper":[42],"proposes":[43],"robust":[45,92],"model":[48],"full-size":[51],"image.":[52,130],"It":[53],"lies":[54],"on":[55],"three":[56],"reversible":[57],"concatenated":[58],"mappings":[59],"proposed.":[60],"The":[61,79,95],"first":[62],"mapping":[63,81,97,102],"uses":[64],"VQGAN":[65],"with":[66],"an":[67,72],"order-preserving":[68],"codebook":[69],"compress":[71],"into":[74,90,108],"more":[76],"concise":[77],"representation.":[78,94,111],"second":[80],"incorporates":[82],"error":[83],"correction":[84],"further":[86],"convert":[87],"the":[88,105,109,127,141],"representation":[89,107,114],"binary":[93,106],"third":[96],"devises":[98],"distribution-preserving":[100],"sampling":[101],"that":[103,134],"transforms":[104],"latent":[110,113],"is":[115],"then":[116],"used":[117],"input":[119],"text-to-image":[122],"Diffusion":[123],"model,":[124],"which":[125],"generates":[126],"final":[128],"stego":[129,142,150],"Experimental":[131],"results":[132],"show":[133],"our":[135],"proposed":[136],"scheme":[137],"can":[138],"freely":[139],"customize":[140],"content.":[144],"Moreover,":[145],"it":[146],"simultaneously":[147],"attains":[148],"high":[149,155],"and":[151,157],"recovery":[152],"quality,":[154],"robustness,":[156],"provable":[158],"security.":[159]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
