{"id":"https://openalex.org/W7128628127","doi":"https://doi.org/10.1186/s42400-025-00486-y","title":"MAE-based image inpainting-steganography method","display_name":"MAE-based image inpainting-steganography method","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128628127","doi":"https://doi.org/10.1186/s42400-025-00486-y"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00486-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00486-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00486-y.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00486-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021652984","display_name":"C. L. Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunying Zhang","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125670697","display_name":"Rui Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Sun","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125651958","display_name":"Jing Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Ren","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125636966","display_name":"Lu Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Liu","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125654801","display_name":"Liya Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liya Wang","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125676873","display_name":"Jiang Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiang Ma","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Tangshan, 063210, China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Tangshan, 063210, China","institution_ids":["https://openalex.org/I137506752"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5125651958"],"corresponding_institution_ids":["https://openalex.org/I137506752"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46082973,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3596999943256378,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.3596999943256378,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.1160999983549118,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.0738999992609024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8389999866485596},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.8342999815940857},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6013000011444092},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5641000270843506},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5239999890327454},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4837000072002411},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.48240000009536743},{"id":"https://openalex.org/keywords/inpainting","display_name":"Inpainting","score":0.42590001225471497},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.4153999984264374},{"id":"https://openalex.org/keywords/additive-white-gaussian-noise","display_name":"Additive white Gaussian noise","score":0.37049999833106995}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8389999866485596},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.8342999815940857},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6743999719619751},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6700000166893005},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6013000011444092},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5641000270843506},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5239999890327454},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5004000067710876},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4837000072002411},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.48240000009536743},{"id":"https://openalex.org/C11727466","wikidata":"https://www.wikidata.org/wiki/Q1628157","display_name":"Inpainting","level":3,"score":0.42590001225471497},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.4153999984264374},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.37049999833106995},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33320000767707825},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.30250000953674316},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29580000042915344},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.27720001339912415},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.26649999618530273},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26429998874664307},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.2637999951839447},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.25360000133514404},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.250900000333786},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.2506999969482422}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00486-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00486-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00486-y.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f457d79df4b74aceb806621f036313f1","is_oa":true,"landing_page_url":"https://doaj.org/article/f457d79df4b74aceb806621f036313f1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00486-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00486-y","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00486-y.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128628127.pdf"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2056568601","https://openalex.org/W2738588019","https://openalex.org/W2892948265","https://openalex.org/W2950820654","https://openalex.org/W2952805129","https://openalex.org/W2962850878","https://openalex.org/W2982163850","https://openalex.org/W2983753904","https://openalex.org/W3037650204","https://openalex.org/W3088438032","https://openalex.org/W3189550944","https://openalex.org/W3211983881","https://openalex.org/W4200575067","https://openalex.org/W4221154378","https://openalex.org/W4221167396","https://openalex.org/W4226519649","https://openalex.org/W4283397660","https://openalex.org/W4286974649","https://openalex.org/W4288636824","https://openalex.org/W4290647491","https://openalex.org/W4304092681","https://openalex.org/W4306404970","https://openalex.org/W4362607395","https://openalex.org/W4377819235","https://openalex.org/W4385338853","https://openalex.org/W4385967767","https://openalex.org/W4386351659","https://openalex.org/W4388036954","https://openalex.org/W4390190371","https://openalex.org/W4392288449","https://openalex.org/W4392348843","https://openalex.org/W4394013894","https://openalex.org/W4399785489","https://openalex.org/W4399788367","https://openalex.org/W4402447877","https://openalex.org/W4402493072","https://openalex.org/W4402580363","https://openalex.org/W4406072228"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"To":[1],"address":[2],"the":[3,14,48,80,96,101,108,118,122,151,163,185,189,199,206,211,215,226,235,268,290],"current":[4],"issue":[5],"that":[6,131,184,234],"existing":[7],"steganographic":[8,67,73,103,302],"techniques":[9,303],"are":[10],"highly":[11,276],"dependent":[12],"on":[13,179,254],"quality":[15,269],"of":[16,110,138,142,148,172,188,201,210,218,270,293],"carrier":[17,295],"images":[18,41,53],"and":[19,35,57,144,157,223,258,280,282],"have":[20],"insufficient":[21],"adaptability":[22],"to":[23,61,100,113,167,198],"damaged":[24,40,294],"images,":[25,296],"we":[26],"propose":[27],"an":[28,140,145],"MAE-based":[29],"inpainting-steganography":[30],"framework,":[31],"which":[32,204],"realizes":[33],"steganography":[34,84,245],"inpainting":[36,81,109,256,264],"for":[37,301],"2D":[38],"color":[39],"through":[42,125],"multi-module":[43],"collaboration.":[44],"The":[45,66,83,105],"encoder":[46],"divides":[47],"original":[49],"244":[50,52],"\u00d7":[51],"into":[54],"non-overlapping":[55],"patches":[56],"performs":[58],"random":[59,202],"masking":[60,248],"generate":[62],"their":[63],"feature":[64,77,90,97,126,134],"sequences.":[65],"point":[68],"prediction":[69],"module":[70,85,120],"locates":[71],"suitable":[72,102],"points":[74],"by":[75,88],"analyzing":[76],"fluctuations":[78],"during":[79],"process.":[82],"embeds":[86],"information":[87,124,227,278],"introducing":[89],"offsets":[91],"at":[92,159],"specific":[93],"positions":[94],"in":[95,289,304],"sequences":[98],"according":[99],"points.":[104],"decoder":[106],"completes":[107],"masked":[111],"regions":[112],"obtain":[114],"stego-inpainted":[115],"images.":[116],"And":[117],"extraction":[119,228],"recovers":[121],"secret":[123],"alignment.":[127],"Experimental":[128],"results":[129,177],"show":[130,183],"with":[132],"a":[133,284,298],"fluctuation":[135],"amplitude":[136],"threshold":[137],"0%,":[139],"offset":[141],"3%,":[143],"embedding":[146,237,279],"capacity":[147,164],"30":[149],"bits,":[150],"verification":[152,286],"success":[153,287],"rate":[154,288],"reaches":[155,231],"96.67%,":[156],"remains":[158],"95.27%":[160],"even":[161,261],"when":[162],"is":[165,192,196],"increased":[166],"1000":[168],"bits.":[169],"In":[170,242],"terms":[171],"anti-steganography":[173],"detection":[174,186],"capability,":[175],"evaluation":[176],"based":[178],"mainstream":[180],"steganalysis":[181],"models":[182],"accuracy":[187,195,229],"proposed":[190],"method":[191],"49.79%.":[193],"This":[194],"close":[197],"level":[200],"guessing,":[203],"indicates":[205],"excellent":[207],"anti-detection":[208],"performance":[209],"method.":[212],"Moreover,":[213],"under":[214,246],"combined":[216],"perturbations":[217],"JPEG":[219],"compression,":[220],"Gaussian":[221],"blur,":[222],"noise":[224],"interference,":[225],"still":[230],"94.68%,":[232],"demonstrating":[233],"feature-domain":[236],"mechanism":[238],"has":[239,250],"good":[240],"robustness.":[241],"addition,":[243],"adding":[244],"different":[247],"ratios":[249],"no":[251],"significant":[252],"impact":[253],"image":[255,271],"performance,":[257],"some":[259],"metrics":[260],"outperform":[262],"pure":[263],"algorithms.":[265],"While":[266],"maintaining":[267],"inpainting,":[272],"this":[273],"framework":[274],"achieves":[275],"reliable":[277],"extraction,":[281],"maintains":[283],"high":[285],"complex":[291],"scenario":[292],"providing":[297],"new":[299],"idea":[300],"practical":[305],"applications.":[306]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2026-02-12T00:00:00"}
