{"id":"https://openalex.org/W4416799456","doi":"https://doi.org/10.1109/apsipaasc65261.2025.11249165","title":"Quantization Index Modulation-Based Reversible Data Hiding in Compressed Neural Network","display_name":"Quantization Index Modulation-Based Reversible Data Hiding in Compressed Neural Network","publication_year":2025,"publication_date":"2025-10-22","ids":{"openalex":"https://openalex.org/W4416799456","doi":"https://doi.org/10.1109/apsipaasc65261.2025.11249165"},"language":null,"primary_location":{"id":"doi:10.1109/apsipaasc65261.2025.11249165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc65261.2025.11249165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010175271","display_name":"Jun Hirano","orcid":null},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jun Hirano","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040107838","display_name":"Jinshui Yang","orcid":"https://orcid.org/0009-0002-5049-2368"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Jonethe Tan Yang","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120437523","display_name":"Fathin Acyuta Makarim","orcid":null},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Fathin Acyuta Makarim","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055207458","display_name":"D. Jayasinghe","orcid":null},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Daham Jayasinghe","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069916756","display_name":"KokSheik Wong","orcid":"https://orcid.org/0000-0002-4893-2291"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"KokSheik Wong","raw_affiliation_strings":["School of Information Technology, Monash University Malaysia,Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University Malaysia,Malaysia","institution_ids":["https://openalex.org/I11662577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010175271"],"corresponding_institution_ids":["https://openalex.org/I11662577"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40692439,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1311","last_page":"1316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.17839999496936798,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.17839999496936798,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.11400000005960464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.09830000251531601,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.9153000116348267},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.645799994468689},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6190999746322632},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.5899999737739563},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4320000112056732},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4169999957084656},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4097000062465668},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.4074999988079071},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.3896999955177307}],"concepts":[{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.9153000116348267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8162000179290771},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.645799994468689},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6190999746322632},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.5899999737739563},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4693000018596649},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4320000112056732},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4169999957084656},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4097000062465668},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.4074999988079071},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3896999955177307},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3889000117778778},{"id":"https://openalex.org/C199833920","wikidata":"https://www.wikidata.org/wiki/Q612536","display_name":"Vector quantization","level":2,"score":0.3783000111579895},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.34880000352859497},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.3400999903678894},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33219999074935913},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.33169999718666077},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3109999895095825},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3050999939441681},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.290800005197525},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2799000144004822},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.27480000257492065},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C160987145","wikidata":"https://www.wikidata.org/wiki/Q13043846","display_name":"Pulse-code modulation","level":3,"score":0.25459998846054077},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apsipaasc65261.2025.11249165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apsipaasc65261.2025.11249165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2107465879","https://openalex.org/W2121393355","https://openalex.org/W2194775991","https://openalex.org/W2592929672","https://openalex.org/W2624385633","https://openalex.org/W2919115771","https://openalex.org/W2963163009","https://openalex.org/W3090291247","https://openalex.org/W3112288498","https://openalex.org/W3168768313","https://openalex.org/W3173922709","https://openalex.org/W4389956176"],"related_works":[],"abstract_inverted_index":{"As":[0],"deep":[1],"neural":[2,63],"networks":[3],"are":[4,115],"increasingly":[5],"deployed":[6],"in":[7,86],"diverse":[8],"applications,":[9],"ensuring":[10],"the":[11,87,92,97,109,116,144,148],"integrity":[12],"of":[13,111,147],"these":[14],"models":[15],"during":[16],"storage":[17],"and":[18,35,100,140],"transmission":[19],"has":[20],"become":[21],"critical.":[22],"In":[23,58],"such":[24],"scenarios,":[25],"model":[26],"compression":[27],"is":[28,161],"not":[29],"only":[30],"essential":[31],"for":[32,126,154,165],"reducing":[33],"size":[34],"bandwidth":[36],"but":[37],"also":[38],"serves":[39],"as":[40],"a":[41,72,79,103,120],"practical":[42],"stage":[43],"to":[44,118,142],"integrate":[45],"protection":[46,49],"mechanisms.":[47],"Such":[48],"mechanisms":[50],"can":[51],"be":[52],"realized":[53],"using":[54,81],"data":[55,74,122,151],"hiding":[56,75,123,152],"technology.":[57],"this":[59],"work,":[60],"we":[61,114],"extend":[62],"network":[64],"coding":[65],"NNCodec":[66,105,155],"(ISO/IEC":[67],"15938":[68],"17)":[69],"by":[70],"introducing":[71],"reversible":[73,121,150],"method.":[76],"We":[77],"insert":[78],"message":[80],"histogram-based":[82],"quantization":[83],"index":[84],"modification":[85],"quantized":[88],"weights,":[89],"then":[90],"package":[91],"modified":[93],"weights":[94],"together":[95],"with":[96],"syntax":[98],"elements":[99],"headers":[101],"into":[102],"fully":[104],"compliant":[106],"bitstream.":[107,157],"To":[108],"best":[110],"our":[112],"knowledge,":[113],"first":[117],"propose":[119],"method":[124,153],"specifically":[125],"NNCodec.":[127],"Experiments":[128],"were":[129],"carried":[130],"out":[131],"on":[132,163],"three":[133],"widely":[134],"used":[135],"architectures,":[136],"namely":[137],"ResNet18,":[138],"VGG16,":[139],"MobileNetV2,":[141],"verify":[143],"basic":[145],"performance":[146],"proposed":[149],"coded":[156],"The":[158],"source":[159],"code":[160],"available":[162],"GitHub":[164],"reproducibility.<sup":[166],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[167,169],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup><sup":[168],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>https://github.com/Jun0003/NeuralNetworkCompression-HQIM-DataHiding":[170]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-28T00:00:00"}
