{"id":"https://openalex.org/W4391661637","doi":"https://doi.org/10.1109/tdsc.2024.3363692","title":"Meta Security Metric Learning for Secure Deep Image Hiding","display_name":"Meta Security Metric Learning for Secure Deep Image Hiding","publication_year":2024,"publication_date":"2024-02-08","ids":{"openalex":"https://openalex.org/W4391661637","doi":"https://doi.org/10.1109/tdsc.2024.3363692"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3363692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3363692","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011131365","display_name":"Qi Cui","orcid":"https://orcid.org/0000-0002-0282-9758"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]},{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Cui","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011972758","display_name":"Weixuan Tang","orcid":"https://orcid.org/0000-0002-4082-1140"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixuan Tang","raw_affiliation_strings":["Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089418255","display_name":"Zhili Zhou","orcid":"https://orcid.org/0000-0002-5641-7169"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhili Zhou","raw_affiliation_strings":["Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006872172","display_name":"Ruohan Meng","orcid":"https://orcid.org/0000-0003-4221-0842"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruohan Meng","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, the School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020360628","display_name":"Guoshun Nan","orcid":"https://orcid.org/0000-0002-1987-2736"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoshun Nan","raw_affiliation_strings":["National Engineering Research Center for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111876760","display_name":"Yun-Qing Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yun-Qing Shi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5011131365"],"corresponding_institution_ids":["https://openalex.org/I200845125","https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":2.6316,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.90499738,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"21","issue":"5","first_page":"4907","last_page":"4920"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7865339517593384},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7386996150016785},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6629025936126709},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5572411417961121},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5336716175079346},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5145646929740906},{"id":"https://openalex.org/keywords/meta-learning","display_name":"Meta learning (computer science)","score":0.49748900532722473},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.47705355286598206},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4379573166370392},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4250245690345764},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.39079707860946655},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1772516369819641}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7865339517593384},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7386996150016785},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6629025936126709},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5572411417961121},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5336716175079346},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5145646929740906},{"id":"https://openalex.org/C2781002164","wikidata":"https://www.wikidata.org/wiki/Q6822311","display_name":"Meta learning (computer science)","level":3,"score":0.49748900532722473},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.47705355286598206},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4379573166370392},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4250245690345764},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39079707860946655},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1772516369819641},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3363692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3363692","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1517612784","display_name":null,"funder_award_id":"61972205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1927763536","display_name":null,"funder_award_id":"2023A1515011428","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G2435205792","display_name":null,"funder_award_id":"62372125","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3814875541","display_name":null,"funder_award_id":"U1936218","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5666409524","display_name":null,"funder_award_id":"62002075","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":93,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1589812914","https://openalex.org/W1861492603","https://openalex.org/W1945046319","https://openalex.org/W1955882805","https://openalex.org/W1965064373","https://openalex.org/W1972785987","https://openalex.org/W1976570511","https://openalex.org/W2015721798","https://openalex.org/W2036237598","https://openalex.org/W2041985330","https://openalex.org/W2075652908","https://openalex.org/W2109824782","https://openalex.org/W2124022325","https://openalex.org/W2134527668","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2322622188","https://openalex.org/W2542290803","https://openalex.org/W2555535051","https://openalex.org/W2621048556","https://openalex.org/W2741137940","https://openalex.org/W2751202750","https://openalex.org/W2792207818","https://openalex.org/W2794363191","https://openalex.org/W2794584741","https://openalex.org/W2798303923","https://openalex.org/W2883233582","https://openalex.org/W2892948265","https://openalex.org/W2948407537","https://openalex.org/W2949862294","https://openalex.org/W2960139675","https://openalex.org/W2963001579","https://openalex.org/W2963462425","https://openalex.org/W2963957509","https://openalex.org/W2969585684","https://openalex.org/W2972035630","https://openalex.org/W2978016341","https://openalex.org/W2978843034","https://openalex.org/W2983753904","https://openalex.org/W2995253937","https://openalex.org/W2997526307","https://openalex.org/W2998792609","https://openalex.org/W3004160624","https://openalex.org/W3013708462","https://openalex.org/W3015313050","https://openalex.org/W3027585699","https://openalex.org/W3034856584","https://openalex.org/W3046549894","https://openalex.org/W3081541465","https://openalex.org/W3088440139","https://openalex.org/W3099900768","https://openalex.org/W3102097413","https://openalex.org/W3105479728","https://openalex.org/W3107032263","https://openalex.org/W3125736290","https://openalex.org/W3134266446","https://openalex.org/W3138564696","https://openalex.org/W3148962243","https://openalex.org/W3162945253","https://openalex.org/W3173269149","https://openalex.org/W3176101515","https://openalex.org/W3176330035","https://openalex.org/W3182074013","https://openalex.org/W3192789783","https://openalex.org/W3196774785","https://openalex.org/W3197062191","https://openalex.org/W3199558812","https://openalex.org/W4205588087","https://openalex.org/W4206292899","https://openalex.org/W4206425634","https://openalex.org/W4214543711","https://openalex.org/W4214666412","https://openalex.org/W4225758314","https://openalex.org/W4288636824","https://openalex.org/W4289752563","https://openalex.org/W4294770674","https://openalex.org/W4308233694","https://openalex.org/W4312906123","https://openalex.org/W4320855224","https://openalex.org/W4382318428","https://openalex.org/W6640731111","https://openalex.org/W6675751002","https://openalex.org/W6736057607","https://openalex.org/W6743223498","https://openalex.org/W6746523225","https://openalex.org/W6750222692","https://openalex.org/W6758677337","https://openalex.org/W6760378562","https://openalex.org/W6768532476","https://openalex.org/W6768560635","https://openalex.org/W6785895317","https://openalex.org/W6849793701"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2792878404","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W2182496537","https://openalex.org/W1716757876"],"abstract_inverted_index":{"Deep":[0],"Image":[1],"Hiding":[2],"(DIH)":[3],"aims":[4],"to":[5,23,123,148,155,173,180],"imperceptibly":[6],"hide":[7],"images":[8,178],"within":[9],"image.":[10],"To":[11,48],"improve":[12],"its":[13],"security":[14,126,195],"performance,":[15],"some":[16],"DIH":[17,59,65],"methods":[18,33],"design":[19],"Security":[20,63],"Metrics":[21],"(SMs)":[22],"guide":[24],"the":[25,68,70,80,115,134,142,149,157,161,165,168,181,193],"learning":[26],"of":[27,82,98,137,160],"their":[28,37],"hiding":[29,75,169],"networks.":[30],"However,":[31],"these":[32,50],"focus":[34],"on":[35,40],"optimizing":[36],"anti-steganalysis":[38],"ability":[39,159],"specific":[41],"SMs,":[42,92],"resulting":[43],"in":[44,52,197],"inferior":[45],"generalization":[46,158],"ability.":[47],"overcome":[49],"limitations,":[51],"this":[53],"paper,":[54],"we":[55],"introduce":[56],"meta-learning":[57],"into":[58],"and":[60,93,102],"propose":[61],"Meta":[62],"Metric-based":[64],"(MSM-DIH).":[66],"In":[67,114,164],"MSM-DIH,":[69],"Invertible":[71],"Neural":[72],"Network":[73],"(INN)-based":[74],"network":[76,101,170],"is":[77,96,109,121,139,171],"learned":[78,122,172,182],"under":[79],"guidance":[81],"a":[83,99,103,118],"learnable":[84],"meta":[85,119,150,162,183],"SM":[86,95,120],"generalized":[87],"from":[88,141],"multiple":[89,143],"fixed":[90],"source":[91,145],"each":[94],"composed":[97],"metric":[100,146,151],"contrastive":[104],"loss":[105],"function.":[106],"Specifically,":[107],"MSM-DIH":[108,190],"trained":[110],"with":[111],"bi-level":[112],"optimization.":[113],"outer":[116],"optimization,":[117,167],"assign":[124],"higher":[125],"scores":[127],"for":[128],"more":[129,175],"advanced":[130],"stego":[131,177],"images.":[132],"Besides,":[133],"domain":[135],"knowledge":[136],"steganalysis":[138],"transferred":[140],"pre-trained":[144],"networks":[147],"network,":[152],"so":[153],"as":[154],"enhance":[156],"SM.":[163,184],"inner":[166],"generate":[174],"secure":[176],"according":[179],"Experimental":[185],"results":[186],"show":[187],"that":[188],"our":[189],"has":[191],"achieved":[192],"best":[194],"performance":[196],"most":[198],"cases.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
