{"id":"https://openalex.org/W7123736317","doi":"https://doi.org/10.1109/mmsp64401.2025.11324270","title":"Secure INN-based Steganography via Model Smoothing and Adversarial Attacks","display_name":"Secure INN-based Steganography via Model Smoothing and Adversarial Attacks","publication_year":2025,"publication_date":"2025-09-21","ids":{"openalex":"https://openalex.org/W7123736317","doi":"https://doi.org/10.1109/mmsp64401.2025.11324270"},"language":null,"primary_location":{"id":"doi:10.1109/mmsp64401.2025.11324270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp64401.2025.11324270","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Workshop on Multimedia Signal Processing (MMSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112119688","display_name":"Weixiang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weixiang Zhao","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004012752","display_name":"Fei Shang","orcid":"https://orcid.org/0000-0003-4037-259X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Shang","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100698658","display_name":"Jin Li","orcid":"https://orcid.org/0000-0002-3534-524X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113524899","display_name":"Jingyang Wen","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyang Wen","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077333494","display_name":"Xiangui Kang","orcid":"https://orcid.org/0000-0002-3134-0353"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangui Kang","raw_affiliation_strings":["Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Sun Yat-Sen University,Guangdong Key Lab of Information Security School of Computer Science and Engineering,Guangzhou,China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122929182","display_name":"Z. Jane Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Z. Jane Wang","raw_affiliation_strings":["University of British Columbia,Electrical and Computer Engineering,Vancouver,Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia,Electrical and Computer Engineering,Vancouver,Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112119688"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66404973,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"114","last_page":"119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.5281000137329102,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.5281000137329102,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.13510000705718994,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.09549999982118607,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7129999995231628},{"id":"https://openalex.org/keywords/smoothing","display_name":"Smoothing","score":0.5600000023841858},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4997999966144562},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.48429998755455017},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.460099995136261},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4496999979019165},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.43479999899864197},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4171000123023987},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3799000084400177}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7541000247001648},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7129999995231628},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5784000158309937},{"id":"https://openalex.org/C3770464","wikidata":"https://www.wikidata.org/wiki/Q775963","display_name":"Smoothing","level":2,"score":0.5600000023841858},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.48429998755455017},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.460099995136261},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4496999979019165},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.43479999899864197},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4171000123023987},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37940001487731934},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37059998512268066},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.3598000109195709},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3513000011444092},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33809998631477356},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33399999141693115},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32179999351501465},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.30480000376701355},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.30250000953674316},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.2930000126361847},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.2797999978065491},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27309998869895935},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.2671999931335449},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mmsp64401.2025.11324270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmsp64401.2025.11324270","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Workshop on Multimedia Signal Processing (MMSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7328976988792419,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2322622188","https://openalex.org/W2621048556","https://openalex.org/W2891158090","https://openalex.org/W2892948265","https://openalex.org/W2960139675","https://openalex.org/W2969542116","https://openalex.org/W2969585684","https://openalex.org/W3046549894","https://openalex.org/W3202281277","https://openalex.org/W4214543711","https://openalex.org/W4225928697","https://openalex.org/W4293846201","https://openalex.org/W4382318756","https://openalex.org/W4386076570","https://openalex.org/W4390854640","https://openalex.org/W4391430021","https://openalex.org/W4392878304","https://openalex.org/W4393159261","https://openalex.org/W4402727049","https://openalex.org/W4403791595","https://openalex.org/W4408352934"],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"image":[3,33],"steganography":[4,34,70],"methods":[5,35],"based":[6],"on":[7],"invertible":[8,19],"neural":[9],"networks":[10],"(INNs)":[11],"have":[12],"received":[13],"significant":[14],"attention":[15],"due":[16],"to":[17,56,97,102,114],"their":[18,39],"structure,":[20],"which":[21],"offers":[22],"advantages":[23],"in":[24],"embedding":[25],"and":[26,51,54],"extracting":[27],"secret":[28,152],"messages.":[29],"However,":[30],"current":[31],"INN-based":[32,119],"face":[36],"challenges,":[37],"particularly":[38],"limited":[40],"tolerance":[41,101],"against":[42,160],"noise":[43,111],"interference":[44],"(e.g.,":[45],"added":[46],"Gaussian":[47],"noise,":[48,103],"adversarial":[49,130],"perturbations,":[50],"JPEG":[52],"compression)":[53],"vulnerability":[55],"detection":[57],"by":[58],"advanced":[59],"deep":[60,135,161],"steganalyzers.":[61,162],"To":[62],"address":[63],"these":[64],"concerns,":[65],"we":[66,121],"present":[67],"a":[68,123],"novel":[69],"framework":[71],"that":[72,105,126,147],"combines":[73],"Median":[74],"Smoothing":[75],"Training":[76],"(MST)":[77],"with":[78,88],"dynamic":[79],"Projected":[80],"Gradient":[81],"Descent":[82],"(d-PGD).":[83],"Specifically,":[84],"our":[85,148],"method":[86,149],"begins":[87],"employing":[89],"an":[90],"MST":[91],"strategy":[92],"during":[93],"the":[94,99,116],"training":[95],"phase":[96],"improve":[98,115],"INN\u2019s":[100],"ensuring":[104],"accurate":[106],"message":[107,153],"extraction":[108,142,154],"even":[109],"under":[110],"interference.":[112],"Subsequently,":[113],"security":[117,139],"of":[118,133],"steganography,":[120],"propose":[122],"d-PGD":[124],"algorithm":[125],"can":[127],"generate":[128],"minimal":[129],"perturbations":[131],"capable":[132],"deceiving":[134],"steganalyzers,":[136],"thereby":[137],"improving":[138,158],"without":[140],"compromising":[141],"accuracy.":[143],"Experimental":[144],"results":[145],"demonstrate":[146],"achieves":[150],"state-of-the-art":[151],"accuracy":[155],"while":[156],"significantly":[157],"resistance":[159]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
