{"id":"https://openalex.org/W3012075496","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023173","title":"Multiple-Operation Image Anti-Forensics with WGAN-GP Framework","display_name":"Multiple-Operation Image Anti-Forensics with WGAN-GP Framework","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012075496","doi":"https://doi.org/10.1109/apsipaasc47483.2019.9023173","mag":"3012075496"},"language":"en","primary_location":{"id":"doi:10.1109/apsipaasc47483.2019.9023173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102220071","display_name":"WU Jian-yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianyuan Wu","raw_affiliation_strings":["Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102902734","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0002-2707-6561"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021251327","display_name":"Hui Zeng","orcid":"https://orcid.org/0000-0002-3776-4309"},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zeng","raw_affiliation_strings":["School of Computer Science & Tech., Southwest University of Science and Tech., Mianyang, China","School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science & Tech., Southwest University of Science and Tech., Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]},{"raw_affiliation_string":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang,China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Lab of Information Security, School of Data and Computer science, Sun Yat-sen University,China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102220071"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.3037,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.62734606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1303","last_page":"1307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.65792316198349},{"id":"https://openalex.org/keywords/computer-forensics","display_name":"Computer forensics","score":0.5968834161758423},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5033416152000427},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.4037964344024658},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2981081008911133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25209301710128784}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65792316198349},{"id":"https://openalex.org/C556601545","wikidata":"https://www.wikidata.org/wiki/Q878553","display_name":"Computer forensics","level":3,"score":0.5968834161758423},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5033416152000427},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.4037964344024658},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2981081008911133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25209301710128784}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc47483.2019.9023173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc47483.2019.9023173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W262444076","https://openalex.org/W1967094344","https://openalex.org/W1973629749","https://openalex.org/W1985705604","https://openalex.org/W2009437133","https://openalex.org/W2050991548","https://openalex.org/W2081060147","https://openalex.org/W2108598243","https://openalex.org/W2118779391","https://openalex.org/W2133436437","https://openalex.org/W2136313643","https://openalex.org/W2148685281","https://openalex.org/W2158071928","https://openalex.org/W2159244236","https://openalex.org/W2220781736","https://openalex.org/W2222347668","https://openalex.org/W2331128040","https://openalex.org/W2562637781","https://openalex.org/W2735904389","https://openalex.org/W2739748921","https://openalex.org/W2774322245","https://openalex.org/W2793891806","https://openalex.org/W2809146085","https://openalex.org/W2902302451","https://openalex.org/W2963470893","https://openalex.org/W2972328267","https://openalex.org/W4255023712","https://openalex.org/W4295521014","https://openalex.org/W4320013936","https://openalex.org/W6679749329","https://openalex.org/W6702130928","https://openalex.org/W6735913928","https://openalex.org/W6741832134"],"related_works":["https://openalex.org/W2181728705","https://openalex.org/W4238452393","https://openalex.org/W2489557937","https://openalex.org/W4247205791","https://openalex.org/W2167366752","https://openalex.org/W3002268218","https://openalex.org/W2385667210","https://openalex.org/W3001565613","https://openalex.org/W2558079263","https://openalex.org/W1506329045"],"abstract_inverted_index":{"A":[0],"challenging":[1],"task":[2],"in":[3,26,102],"the":[4,13,29,48,69,86,93,96,111,116],"field":[5],"of":[6,19,73,95,118],"multimedia":[7],"security":[8],"involves":[9],"concealing":[10],"or":[11],"eliminating":[12],"traces":[14],"left":[15],"by":[16],"a":[17],"chain":[18],"multiple":[20],"manipulating":[21],"operations,":[22],"i.e.,":[23],"multiple-operation":[24,81,119],"anti-forensics":[25,61],"short.":[27],"However,":[28],"existing":[30],"anti-forensic":[31,71,82],"works":[32],"concentrate":[33],"on":[34],"one":[35],"specific":[36],"manipulation,":[37],"referred":[38],"as":[39,62],"single-operation":[40],"anti-forensics.":[41,120],"In":[42],"this":[43,109],"work,":[44],"we":[45],"propose":[46],"using":[47],"improved":[49],"Wasserstein":[50],"generative":[51],"adversarial":[52],"networks":[53],"with":[54],"gradient":[55],"penalty":[56],"(WGAN-GP)":[57],"to":[58,114],"model":[59],"image":[60],"an":[63],"image-to-image":[64],"translation":[65],"problem":[66,117],"and":[67,98],"obtain":[68],"optimized":[70],"models":[72],"multiple-operation.":[74],"The":[75],"experimental":[76],"results":[77],"demonstrate":[78],"that":[79],"our":[80,106],"scheme":[83],"successfully":[84],"deceives":[85],"state-of-the-art":[87],"forensic":[88],"algorithms":[89],"without":[90],"significantly":[91],"degrading":[92],"quality":[94,101],"image,":[97],"even":[99],"enhancing":[100],"most":[103],"cases.":[104],"To":[105],"best":[107],"knowledge,":[108],"is":[110],"first":[112],"attempt":[113],"explore":[115]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
