{"id":"https://openalex.org/W4411172750","doi":"https://doi.org/10.1109/tifs.2025.3578231","title":"JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks","display_name":"JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411172750","doi":"https://doi.org/10.1109/tifs.2025.3578231"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3578231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3578231","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101323333","display_name":"Tiewei Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tiewei Qin","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072124687","display_name":"Bingwen Feng","orcid":"https://orcid.org/0000-0003-1402-4663"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingwen Feng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101243064","display_name":"Bingbing Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingbing Zhou","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066042962","display_name":"Jilian Zhang","orcid":"https://orcid.org/0000-0001-7117-3951"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilian Zhang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005319671","display_name":"Zhihua Xia","orcid":"https://orcid.org/0000-0001-6860-647X"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Xia","raw_affiliation_strings":["College of Cyber Security, Engineering Research Center for Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","Engineering Research Center for Trustworthy AI, Ministry of Education, College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Engineering Research Center for Trustworthy AI, Ministry of Education, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618"]},{"raw_affiliation_string":"Engineering Research Center for Trustworthy AI, Ministry of Education, College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jian Weng","orcid":"https://orcid.org/0000-0003-4067-8230"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083054357","display_name":"Wei Lu","orcid":"https://orcid.org/0000-0002-4068-1766"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Lu","raw_affiliation_strings":["School of Computer Science and Engineering, Ministry of Education Key Laboratory of Information Technology, Guangdong Province Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Ministry of Education Key Laboratory of Information Technology, Guangdong Province Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Province Key Laboratory of Information Security Technology, Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101323333"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11280743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"6019","last_page":"6032"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9293000102043152,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112586140632629},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.6257928013801575},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6009401082992554},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.575062096118927},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5638332366943359},{"id":"https://openalex.org/keywords/invertible-matrix","display_name":"Invertible matrix","score":0.5594040155410767},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5589456558227539},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4912366271018982},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.48450538516044617},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.47986406087875366},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.47829657793045044},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.45583346486091614},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.4443851113319397},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.40843021869659424},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3220798373222351},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.28262582421302795},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1351282000541687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112586140632629},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.6257928013801575},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6009401082992554},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.575062096118927},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5638332366943359},{"id":"https://openalex.org/C96442724","wikidata":"https://www.wikidata.org/wiki/Q242188","display_name":"Invertible matrix","level":2,"score":0.5594040155410767},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5589456558227539},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4912366271018982},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.48450538516044617},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.47986406087875366},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.47829657793045044},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.45583346486091614},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.4443851113319397},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.40843021869659424},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3220798373222351},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.28262582421302795},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1351282000541687},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3578231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3578231","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G228428193","display_name":null,"funder_award_id":"62472199","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2428307698","display_name":null,"funder_award_id":"2022YFB3103100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2434235226","display_name":null,"funder_award_id":"62261160653","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2805406393","display_name":null,"funder_award_id":"62020106013","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3468347914","display_name":null,"funder_award_id":"2025A1515011601","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G6258482808","display_name":null,"funder_award_id":"62122032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6747803806","display_name":null,"funder_award_id":"62472197","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7263650625","display_name":null,"funder_award_id":"U23B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7750792420","display_name":null,"funder_award_id":"62441237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W2099111195","https://openalex.org/W2322622188","https://openalex.org/W2892948265","https://openalex.org/W2919023666","https://openalex.org/W2997526307","https://openalex.org/W2998689703","https://openalex.org/W3034723751","https://openalex.org/W3035574324","https://openalex.org/W3094546693","https://openalex.org/W3126687583","https://openalex.org/W3182074013","https://openalex.org/W4205588087","https://openalex.org/W4214543711","https://openalex.org/W4225758314","https://openalex.org/W4252632855","https://openalex.org/W4288804960","https://openalex.org/W4293518269","https://openalex.org/W4308519452","https://openalex.org/W4312906123","https://openalex.org/W4313029666","https://openalex.org/W4318348219","https://openalex.org/W4320900861","https://openalex.org/W4366492959","https://openalex.org/W4386158715","https://openalex.org/W4386159854","https://openalex.org/W4388283577","https://openalex.org/W4391427679","https://openalex.org/W4393159261","https://openalex.org/W4401025006","https://openalex.org/W6631190155","https://openalex.org/W6635084905","https://openalex.org/W6640731111","https://openalex.org/W6714644935","https://openalex.org/W6745560452","https://openalex.org/W6752910514","https://openalex.org/W6765779288","https://openalex.org/W6779823529","https://openalex.org/W6785895317","https://openalex.org/W6810146603","https://openalex.org/W6853320337","https://openalex.org/W6868279458"],"related_works":["https://openalex.org/W3190486427","https://openalex.org/W4243959093","https://openalex.org/W1998280942","https://openalex.org/W1992410481","https://openalex.org/W2441603424","https://openalex.org/W2026465795","https://openalex.org/W2145138541","https://openalex.org/W3137515556","https://openalex.org/W2132503095","https://openalex.org/W1996073382"],"abstract_inverted_index":{"Generative":[0],"steganography":[1],"is":[2],"renowned":[3],"for":[4,16,138],"its":[5],"exceptional":[6],"undetectability.":[7],"However,":[8],"prevalent":[9],"generative":[10,26,47],"methods":[11],"often":[12],"have":[13],"insufficient":[14],"capacity":[15],"concealing":[17],"secret":[18,58],"images.":[19,115,151],"Furthermore,":[20],"the":[21,29,85,100,110,113,118,139,145,149],"sensitivity":[22],"of":[23,31,84,112,120,144,164],"commonly":[24],"utilized":[25],"models":[27],"exacerbates":[28],"challenge":[30],"ensuring":[32],"robustness":[33],"against":[34,105],"channel":[35],"distortions":[36],"such":[37],"as":[38],"JPEG":[39,106],"compression.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44,69,133],"introduce":[45],"a":[46,64,129],"image":[48,66,166],"hiding":[49,167],"network":[50],"that":[51,156],"employs":[52],"two":[53,135],"invertible":[54],"generators":[55,79],"to":[56,80,128],"transform":[57],"images":[59,62,127],"into":[60],"stego":[61,126,150],"within":[63,77],"disparate":[65],"domain.":[67],"Additionally,":[68],"seamlessly":[70],"integrate":[71],"an":[72],"up-and-down":[73],"sampling":[74],"module":[75],"(UDM)":[76],"these":[78],"facilitate":[81],"efficient":[82],"decoupling":[83],"intermediate":[86,101],"representations":[87],"obtained":[88],"by":[89],"each":[90],"generator.":[91],"The":[92,152],"UDM":[93],"serves":[94],"multiple":[95],"purposes:":[96],"preserving":[97],"coherence":[98],"between":[99],"representations,":[102],"enhancing":[103],"resilience":[104],"compression,":[107],"and":[108,124,141,171],"safeguarding":[109],"confidentiality":[111],"concealed":[114],"To":[116],"address":[117],"complexity":[119],"mapping":[121],"both":[122],"uncompressed":[123],"compressed":[125],"unified":[130],"intermediary":[131],"representation,":[132],"implement":[134],"distinct":[136],"flows":[137],"forward":[140],"backward":[142],"processes":[143],"generator":[146],"associated":[147],"with":[148],"experimental":[153],"results":[154],"show":[155],"our":[157],"scheme":[158],"offers":[159],"concurrent":[160],"advantages":[161],"in":[162],"terms":[163],"full-size":[165],"ability,":[168],"undetectability,":[169],"confidentiality,":[170],"robustness.":[172]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
