{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2017:YY5LGFE5S5Q2QWNKY7FVMF63UN","short_pith_number":"pith:YY5LGFE5","schema_version":"1.0","canonical_sha256":"c63ab3149d9761a859aac7cb5617dba345b09718cc2bfc31d255a42c9925e249","source":{"kind":"arxiv","id":"1707.01613","version":4},"attestation_state":"computed","paper":{"title":"SSGAN: Secure Steganography Based on Generative Adversarial Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.MM"],"primary_cat":"cs.CV","authors_text":"Haichao Shi, Jing Dong, Wei Wang, Xiaoyu Zhang, Yinlong Qian","submitted_at":"2017-07-06T02:05:51Z","abstract_excerpt":"In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography. The proposed architecture has one generative network, and two discriminative networks. The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding. Different from the existing work which adopts Deep Convolutional Generative Adversarial Networks, we utilize another form of generative adversarial"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1707.01613","kind":"arxiv","version":4},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-07-06T02:05:51Z","cross_cats_sorted":["cs.MM"],"title_canon_sha256":"898bc91c80d74db3b2b5ba029bf12418a499b38399600105911c2b09b181f432","abstract_canon_sha256":"a6d99fd09ad668c1378833ebd81a13116de58e7a90fe8a97148d20859090fbf3"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:00:02.553140Z","signature_b64":"EMT3ASLRwLbF8jL79K4OeanokicS193zbsuj8bkYYmZKEbxShk7Q5TQnw2aMSr3rCzdfNo60Tr/nbfaPjJhxBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c63ab3149d9761a859aac7cb5617dba345b09718cc2bfc31d255a42c9925e249","last_reissued_at":"2026-05-18T00:00:02.552683Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:00:02.552683Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"SSGAN: Secure Steganography Based on Generative Adversarial Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.MM"],"primary_cat":"cs.CV","authors_text":"Haichao Shi, Jing Dong, Wei Wang, Xiaoyu Zhang, Yinlong Qian","submitted_at":"2017-07-06T02:05:51Z","abstract_excerpt":"In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography. The proposed architecture has one generative network, and two discriminative networks. The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding. Different from the existing work which adopts Deep Convolutional Generative Adversarial Networks, we utilize another form of generative adversarial"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1707.01613","kind":"arxiv","version":4},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1707.01613","created_at":"2026-05-18T00:00:02.552749+00:00"},{"alias_kind":"arxiv_version","alias_value":"1707.01613v4","created_at":"2026-05-18T00:00:02.552749+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1707.01613","created_at":"2026-05-18T00:00:02.552749+00:00"},{"alias_kind":"pith_short_12","alias_value":"YY5LGFE5S5Q2","created_at":"2026-05-18T12:31:59.375834+00:00"},{"alias_kind":"pith_short_16","alias_value":"YY5LGFE5S5Q2QWNK","created_at":"2026-05-18T12:31:59.375834+00:00"},{"alias_kind":"pith_short_8","alias_value":"YY5LGFE5","created_at":"2026-05-18T12:31:59.375834+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN","json":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN.json","graph_json":"https://pith.science/api/pith-number/YY5LGFE5S5Q2QWNKY7FVMF63UN/graph.json","events_json":"https://pith.science/api/pith-number/YY5LGFE5S5Q2QWNKY7FVMF63UN/events.json","paper":"https://pith.science/paper/YY5LGFE5"},"agent_actions":{"view_html":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN","download_json":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN.json","view_paper":"https://pith.science/paper/YY5LGFE5","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1707.01613&json=true","fetch_graph":"https://pith.science/api/pith-number/YY5LGFE5S5Q2QWNKY7FVMF63UN/graph.json","fetch_events":"https://pith.science/api/pith-number/YY5LGFE5S5Q2QWNKY7FVMF63UN/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN/action/timestamp_anchor","attest_storage":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN/action/storage_attestation","attest_author":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN/action/author_attestation","sign_citation":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN/action/citation_signature","submit_replication":"https://pith.science/pith/YY5LGFE5S5Q2QWNKY7FVMF63UN/action/replication_record"}},"created_at":"2026-05-18T00:00:02.552749+00:00","updated_at":"2026-05-18T00:00:02.552749+00:00"}