{"id":"https://openalex.org/W4390906161","doi":"https://doi.org/10.1109/tnse.2024.3354941","title":"Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages","display_name":"Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages","publication_year":2024,"publication_date":"2024-01-16","ids":{"openalex":"https://openalex.org/W4390906161","doi":"https://doi.org/10.1109/tnse.2024.3354941"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2024.3354941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3354941","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037182288","display_name":"Wenying Wen","orcid":"https://orcid.org/0000-0002-3098-4640"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenying Wen","raw_affiliation_strings":["School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103002126","display_name":"Haigang Huang","orcid":"https://orcid.org/0009-0002-6678-7515"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haigang Huang","raw_affiliation_strings":["School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024003946","display_name":"Shuren Qi","orcid":"https://orcid.org/0000-0003-0574-2313"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuren Qi","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063013411","display_name":"Yuming Fang","orcid":"https://orcid.org/0000-0002-6946-3586"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuming Fang","raw_affiliation_strings":["School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Jiangxi University of Finance and Economics, Nanchang, China","institution_ids":["https://openalex.org/I59649739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5037182288"],"corresponding_institution_ids":["https://openalex.org/I59649739"],"apc_list":null,"apc_paid":null,"fwci":8.3296,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.98375066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"3","first_page":"2951","last_page":"2962"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8620239496231079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.653712809085846},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.63258296251297},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.6187252998352051},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.49796128273010254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4660542905330658},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.45572227239608765},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.44705289602279663},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.44455158710479736},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.4414413869380951},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41723114252090454},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41484907269477844},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3622973561286926}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8620239496231079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.653712809085846},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.63258296251297},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.6187252998352051},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.49796128273010254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4660542905330658},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.45572227239608765},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.44705289602279663},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.44455158710479736},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4414413869380951},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41723114252090454},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41484907269477844},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3622973561286926},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2024.3354941","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2024.3354941","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5547888696","display_name":null,"funder_award_id":"62201233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5707108624","display_name":null,"funder_award_id":"jxsq2023201118","funder_id":"https://openalex.org/F3692415409","funder_display_name":"Double Thousand Plan of Jiangxi Province"},{"id":"https://openalex.org/G590551340","display_name":null,"funder_award_id":"20224BAB212012","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"},{"id":"https://openalex.org/G5977743603","display_name":null,"funder_award_id":"61961022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6420429142","display_name":null,"funder_award_id":"20224BAB211002","funder_id":"https://openalex.org/F4320322665","funder_display_name":"Natural Science Foundation of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F3692415409","display_name":"Double Thousand Plan of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322665","display_name":"Natural Science Foundation of Jiangxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W967544008","https://openalex.org/W1834627138","https://openalex.org/W1972291170","https://openalex.org/W2022747097","https://openalex.org/W2058135112","https://openalex.org/W2060919434","https://openalex.org/W2076117055","https://openalex.org/W2098193635","https://openalex.org/W2106661586","https://openalex.org/W2129112648","https://openalex.org/W2133665775","https://openalex.org/W2137307093","https://openalex.org/W2158986121","https://openalex.org/W2165122229","https://openalex.org/W2294087712","https://openalex.org/W2322622188","https://openalex.org/W2474790722","https://openalex.org/W2542290803","https://openalex.org/W2551209091","https://openalex.org/W2593304355","https://openalex.org/W2621048556","https://openalex.org/W2736248659","https://openalex.org/W2751202750","https://openalex.org/W2770125940","https://openalex.org/W2808437524","https://openalex.org/W2860433205","https://openalex.org/W2891682990","https://openalex.org/W2896359486","https://openalex.org/W2898292234","https://openalex.org/W2901329636","https://openalex.org/W2908539050","https://openalex.org/W2932414082","https://openalex.org/W2962770929","https://openalex.org/W2962793481","https://openalex.org/W2963863119","https://openalex.org/W2991799930","https://openalex.org/W3004040772","https://openalex.org/W3034706371","https://openalex.org/W3035574324","https://openalex.org/W3086773888","https://openalex.org/W3088440139","https://openalex.org/W3092987439","https://openalex.org/W3098705456","https://openalex.org/W3103943044","https://openalex.org/W3119411117","https://openalex.org/W4205668919","https://openalex.org/W4225758314","https://openalex.org/W4282018642","https://openalex.org/W4312416962","https://openalex.org/W4362500847","https://openalex.org/W4366492959","https://openalex.org/W6625168331","https://openalex.org/W6640843618","https://openalex.org/W6680346038","https://openalex.org/W6765779288","https://openalex.org/W6780043386"],"related_works":["https://openalex.org/W2154118756","https://openalex.org/W127724361","https://openalex.org/W2166431153","https://openalex.org/W129330134","https://openalex.org/W1965991389","https://openalex.org/W2038796355","https://openalex.org/W2158736088","https://openalex.org/W1974279004","https://openalex.org/W2370747589","https://openalex.org/W1716757876"],"abstract_inverted_index":{"With":[0],"the":[1,21,51,63,104,119,142,168,174,179,194,198,203,223,231,236,239,258,261],"rapid":[2],"development":[3],"of":[4,9,23,54,58,202,238],"internet":[5],"applications,":[6],"privacy":[7],"protection":[8],"secret":[10,55,67,74,127,262],"messages":[11,75],"in":[12,26,118,211],"covert":[13,27,52],"communication":[14,53],"has":[15],"become":[16],"increasingly":[17],"important.":[18],"To":[19],"address":[20],"issue":[22],"attacks":[24],"received":[25],"communication,":[28],"such":[29],"as":[30,62,87],"eavesdropping":[31,98],"attacks,":[32,34,37],"steganalysis":[33,101],"and":[35,47,84,99,152,189,200,222],"tempering":[36],"we":[38,134],"propose":[39],"a":[40,78,85,91],"novel":[41],"scheme":[42,216],"that":[43],"combines":[44],"coverless":[45,70],"steganography":[46,71,209],"image":[48,61,108,137,144,148,176,182,225,241],"transformation":[49,138],"for":[50,156],"messages.":[56],"Instead":[57],"using":[59],"an":[60,136],"carrier":[64],"to":[65,81,89,113,124,131,177,196,256],"embed":[66],"messages,":[68],"our":[69,214],"approach":[72],"hides":[73],"by":[76,193],"exploiting":[77],"generative":[79],"network":[80],"take":[82],"it":[83],"latent":[86],"input":[88],"synthesize":[90],"stego":[92,107,143,161,220,224],"image,":[93],"thus":[94,153],"essentially":[95],"avoiding":[96],"both":[97],"typical":[100],"attacks.":[102],"Furthermore,":[103],"generated":[105],"pseudorealistic":[106],"with":[109,207,242],"distortion":[110],"vulnerabilities":[111],"leads":[112],"tampering,":[114],"which":[115,140,253],"ultimately":[116],"results":[117],"receiver":[120,195],"not":[121],"being":[122,164],"able":[123],"correctly":[125],"extract":[126],"information.":[128],"In":[129],"response":[130],"this":[132],"problem,":[133],"design":[135],"method,":[139],"converts":[141],"into":[145,173],"another":[146],"realistic":[147],"(i.e.,":[149,245],"camouflage":[150,175,204,232,240],"image)":[151],"provides":[154],"ambiguity":[155],"spoofing":[157],"attackers":[158],"while":[159],"preventing":[160],"images":[162],"from":[163,230],"tampered":[165],"with.":[166],"Additionally,":[167],"authentication":[169,181,243],"information":[170,244],"is":[171,251,254],"embedded":[172],"obtain":[178],"transmitted":[180],"(":[183],"<inline-formula":[184,246],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[185,247],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[186,248],"notation=\"LaTeX\">$AuI$</tex-math></inline-formula>":[187,249],")":[188,250],"can":[190,226,266],"be":[191,227],"used":[192],"validate":[197],"completeness":[199],"authenticity":[201],"image.":[205,233],"Compared":[206],"related":[208],"methods":[210],"recent":[212],"years,":[213],"proposed":[215],"synthesizes":[217],"more":[218],"high-quality":[219],"images,":[221],"restored":[228],"losslessly":[229],"Most":[234],"importantly,":[235],"PSNR":[237],"31.78,":[252],"enough":[255],"deceive":[257],"attacker;":[259],"moreover,":[260],"message":[263],"extraction":[264],"rate":[265],"reach":[267],"100%.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
