Retraction

Neural Reversible Steganography with Long Short-Term Memory

Paper Information

Record ID:
58248
Publication Date:
April 05, 2021
Retraction Date:
December 29, 2023 (1.9 year years ago)
Article Type:
Publisher:
Hindawi
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed

Citations (28)

28
Total Citations
4
Post-Retraction
(14.3%)
23
Pre-Retraction
1
Same Day
Post-Retraction Citation Analysis
2 Within 30 days
4 Within 1 year
0 After 2+ years
294 Days since retraction (latest)
A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem et al. (4 authors)
Engineering Applications of Artificial Intelligence
Published: Oct 2024
294 days after retraction
Reversible data hiding scheme using prediction neural network and adaptive modulation mapping
Sisheng Chen, Chin‐Chen Chang, Ji-Hwei Horng
Multimedia Tools and Applications
Published: Apr 2024
113 days after retraction
Adaptive Image Steganography Domain: A Review of the Recent Works
Rana Sami Hameed, Forat Falih Hasan, Azmi Shawkat Abdulbaqi
Lecture notes in networks and systems
Published: Jan 2024
3 days after retraction
Mutual Normalized Garsia Wachs and Autoencoder Disentangle Log Likelihood Based Secure Steganography
R Padma, Dr.Vamsidhar Yendapalli
Unknown Journal
Published: Jan 2024
3 days after retraction
Retracted: Neural Reversible Steganography with Long Short-Term Memory
Security and Communication Networks
Security and Communication Networks Open Access
Published: Dec 2023
1 citation
Same day as retraction
Enhancing Secret Image Authentication Through Encryption-Based Steganography with Reversible Watermarking
P. Lakshmi, G Sunil, Ali Ashoor Issa et al. (5 authors)
Unknown Journal
Published: Dec 2023
25 days before retraction
STEG-XAI: explainable steganalysis in images using neural networks
Eugenia Kuchumova, Sergio Mauricio Martínez Monterrubio, Juan A. Recio-Garcí­a
Multimedia Tools and Applications
Published: Nov 2023
1 citation
52 days before retraction
Lagrangian Recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for Secure Image Transmission
J. Shaik Dawood Ansari, P. Tamilselvan
International Journal on Recent and Innovation Trends in Computing and Communication Open Access
Published: Oct 2023
83 days before retraction
RoSteALS: Robust Steganography using Autoencoder Latent Space
Tu Bui, Shruti Agarwal, Ning Yu et al. (4 authors)
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) Open Access
Published: Jun 2023
27 citations
211 days before retraction
Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Zihan Wang, Olivia Byrnes, Hu Wang et al. (8 authors)
IEEE Transactions on Computational Social Systems Open Access
Published: May 2023
38 citations
231 days before retraction
On the predictability in reversible steganography
Ching‐Chun Chang, Xu Wang, Sisheng Chen et al. (5 authors)
Telecommunication Systems Open Access
Published: Jan 2023
1 citation
354 days before retraction
Research on the Operation Management Strategy of Cross Cultural Communication of Traditional Culture Short Video
Mingfei Ma
Academic Journal of Humanities & Social Sciences Open Access
Published: Jan 2023
1 citation
362 days before retraction
Deep Learning for Predictive Analytics in Reversible Steganography
Ching‐Chun Chang, Xu Wang, Sisheng Chen et al. (6 authors)
IEEE Access Open Access
Published: Jan 2023
5 citations
362 days before retraction
Less is more: learning predictability in reversible steganography
Ching‐Chun Chang, Xu Wang, Sisheng Chen et al. (5 authors)
Research Square (Research Square) Open Access
Published: Jul 2022
532 days before retraction
Deep Image Steganography Using Transformer and Recursive Permutation
Zhiyi Wang, Mingcheng Zhou, Bo-Ji Liu et al. (4 authors)
Entropy Open Access
Published: Jun 2022
20 citations
551 days before retraction
Automation of reversible steganographic coding with nonlinear discrete optimisation
Ching‐Chun Chang
Connection Science Open Access
Published: Jun 2022
2 citations
563 days before retraction
A Graphical-Based Video Steganography for Information Security
Payal Bose, Shawni Dutta, Vishal Goyal et al. (4 authors)
Lecture notes in networks and systems
Published: Jun 2022
568 days before retraction
A Steganography Based on Optimal Multi-Threshold Block Labeling
Shuying Xu, Chin‐Chen Chang, Ji-Hwei Horng
Computer Systems Science and Engineering Open Access
Published: Jun 2022
5 citations
576 days before retraction
Position-Aware Guided Hiding Data Scheme with Reversibility and Adaptivity for Dual Images
Chin‐Chen Chang, Guo-Dong Su, Chia‐Chen Lin et al. (4 authors)
Symmetry Open Access
Published: Mar 2022
4 citations
667 days before retraction
A k,n-Threshold Secret Image Sharing Scheme Based on a Non-Full Rank Linear Model
Ji-Hwei Horng, Si-Sheng Chen, Chin‐Chen Chang
Mathematics Open Access
Published: Feb 2022
3 citations
690 days before retraction
Bayesian Neural Networks for Reversible Steganography
Ching‐Chun Chang
IEEE Access Open Access
Published: Jan 2022
7 citations
727 days before retraction
Privacy-Preserving Reversible Data Hiding for Medical Images Employing Local Rotation
Guo-Dong Su, Chia‐Chen Lin, Chin‐Chen Chang
Journal of Healthcare Engineering Open Access
Published: Jul 2021
5 citations
911 days before retraction
Deep Learning for Reversible Steganography: Principles and Insights.
Ching‐Chun Chang, Xu Wang, Sisheng Chen et al. (6 authors)
arXiv (Cornell University)
Published: Jun 2021
929 days before retraction
A Watermarking Scheme for Color Image Using Quaternion Discrete Fourier Transform and Tensor Decomposition
Li Li, Rui Bai, Jianfeng Lu et al. (5 authors)
Applied Sciences Open Access
Published: May 2021
13 citations
945 days before retraction
Antitamper Image Watermarking Based on Cellular Network Topology for IoT‐Themed Mobile Forensics
Xiao‐Zhu Xie, Ching-Chun Chang, Zhongliang Yang et al. (4 authors)
Wireless Communications and Mobile Computing Open Access
Published: Jan 2021
1092 days before retraction
Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT
Sisheng Chen, Ching‐Chun Chang, Isao Echizen
IEEE Access Open Access
Published: Jan 2021
7 citations
1092 days before retraction
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Zihan Wang, Olivia Byrnes, Wang Hu et al. (8 authors)
arXiv (Cornell University) Open Access
Published: Jan 2021
9 citations
1092 days before retraction
Steganography in RGB Images Using Adjacent Mean
Yun‐Hsin Chuang, Bor-Shing Lin, Yanxiang Chen et al. (4 authors)
IEEE Access Open Access
Published: Jan 2021
12 citations
1092 days before retraction
Quick Stats
Total Citations: 28
Years Since Retraction: 1.9 year
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Fuzzy N-soft sets: A novel model with applications
Journal of Intelligent & Fuzzy Systems • 137 citations
An interactive approach to probabilistic hesitant fuzzy mul…
Journal of Intelligent & Fuzzy Systems • 74 citations
Distance and similarity measures for hesitant interval-valu…
Journal of Intelligent & Fuzzy Systems • 60 citations
Probabilistic linguistic QUALIFLEX approach with possibilit…
Journal of Intelligent & Fuzzy Systems • 56 citations
Artificial intelligence speech recognition model for correc…
Journal of Intelligent & Fuzzy Systems • 53 citations