{"id":"https://openalex.org/W4407130548","doi":"https://doi.org/10.1109/dsc63484.2024.00061","title":"INN-based Robust JPEG Steganography Through Cover Coefficient Selection","display_name":"INN-based Robust JPEG Steganography Through Cover Coefficient Selection","publication_year":2024,"publication_date":"2024-08-23","ids":{"openalex":"https://openalex.org/W4407130548","doi":"https://doi.org/10.1109/dsc63484.2024.00061"},"language":"en","primary_location":{"id":"doi:10.1109/dsc63484.2024.00061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc63484.2024.00061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004012752","display_name":"Fei Shang","orcid":"https://orcid.org/0000-0003-4037-259X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Shang","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112119688","display_name":"Weixiang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixiang Zhao","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113524899","display_name":"Jingyang Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyang Wen","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security, School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080051025","display_name":"Z. Jane Wang","orcid":"https://orcid.org/0009-0006-6717-4357"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Z. Jane Wang","raw_affiliation_strings":["University of British Columbia,Electrical and Computer Engineering,Vancouver,Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia,Electrical and Computer Engineering,Vancouver,Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004012752"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27722279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"406","last_page":"413"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12707","display_name":"Vehicle License Plate Recognition","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7786003351211548},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.7399004101753235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6066638827323914},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.57625412940979},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.46419987082481384},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.4438786804676056},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4301333427429199},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3617746829986572},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.2856634259223938},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.26382753252983093},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1347174346446991},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.06959649920463562}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7786003351211548},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.7399004101753235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6066638827323914},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.57625412940979},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.46419987082481384},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.4438786804676056},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4301333427429199},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3617746829986572},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.2856634259223938},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.26382753252983093},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1347174346446991},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.06959649920463562},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc63484.2024.00061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc63484.2024.00061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2134527668","https://openalex.org/W2170598445","https://openalex.org/W2490784316","https://openalex.org/W2793915433","https://openalex.org/W2883233582","https://openalex.org/W2905058180","https://openalex.org/W2912620163","https://openalex.org/W2952773607","https://openalex.org/W2953197802","https://openalex.org/W2962274287","https://openalex.org/W2981228172","https://openalex.org/W3013708462","https://openalex.org/W3089337021","https://openalex.org/W3107032263","https://openalex.org/W3173217100","https://openalex.org/W3180361871","https://openalex.org/W3182074013","https://openalex.org/W3206996732","https://openalex.org/W4205588087","https://openalex.org/W4211142182","https://openalex.org/W4312906123","https://openalex.org/W4323519340","https://openalex.org/W4362468085","https://openalex.org/W4366966879","https://openalex.org/W4382239882","https://openalex.org/W4382318756","https://openalex.org/W4391430021","https://openalex.org/W4392798054","https://openalex.org/W6635084905"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W1529294424","https://openalex.org/W2160587766","https://openalex.org/W2241212938","https://openalex.org/W2357125417","https://openalex.org/W1966340347","https://openalex.org/W4220747575","https://openalex.org/W2105458961","https://openalex.org/W2037059691"],"abstract_inverted_index":{"Images":[0],"transmitted":[1],"through":[2,37],"social":[3],"networks":[4,59],"generally":[5],"undergo":[6],"JPEG":[7,34,51,64],"recompression,":[8],"which":[9,41],"degrades":[10],"image":[11,117],"quality":[12,67],"and":[13,53,70,95,109,139],"could":[14],"disrupt":[15],"embedded":[16],"secret":[17],"messages,":[18],"making":[19],"error-free":[20],"extraction":[21,78],"of":[22,50,56,114,121],"such":[23],"messages":[24],"difficult.":[25],"In":[26],"this":[27],"paper,":[28],"we":[29,85],"propose":[30],"an":[31],"INN-based":[32,131],"robust":[33],"steganography":[35],"framework":[36],"cover":[38],"coefficient":[39],"selection,":[40],"selects":[42],"appropriate":[43],"embedding":[44],"coefficients":[45],"based":[46],"on":[47],"prior":[48],"knowledge":[49],"compression":[52],"the":[54,74,103,115,119],"characteristics":[55],"invertible":[57],"neural":[58],"(INNs).":[60],"When":[61,127],"subjected":[62],"to":[63,101,110],"recompression":[65],"with":[66,129],"factor":[68],"(QF)=90":[69],"QF=85":[71],"during":[72],"transmission,":[73],"proposed":[75],"method":[76,134],"achieves":[77],"accuracy":[79],"as":[80,82,123,125],"high":[81],"100%.":[83],"Moreover,":[84],"introduce":[86],"a":[87],"novel":[88],"learnable":[89],"noise":[90],"layer":[91],"that":[92],"incorporates":[93],"rounding":[94,108],"truncation":[96],"operations":[97],"into":[98],"network":[99],"training,":[100],"mitigate":[102],"information":[104],"loss":[105],"caused":[106],"by":[107,137,142],"limit":[111],"pixel":[112],"values":[113],"stego":[116],"within":[118],"range":[120],"[0-255]":[122],"much":[124],"possible.":[126],"compared":[128],"existing":[130],"methods,":[132],"our":[133],"reduces":[135],"runtime":[136],"23%":[138],"memory":[140],"usage":[141],"82.14%.":[143]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
