{"id":"https://openalex.org/W3138564696","doi":"https://doi.org/10.1109/tifs.2021.3104140","title":"MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography","display_name":"MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3138564696","doi":"https://doi.org/10.1109/tifs.2021.3104140","mag":"3138564696"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3104140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3104140","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2103.13689","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xianbo Mo","orcid":"https://orcid.org/0000-0001-9198-5041"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-9198-5041","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7457-3691","affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-2613-5451","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7625-5689","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":2.6214,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.91433049,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"16","issue":null,"first_page":"4306","last_page":"4320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.8429999947547913},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7638999819755554},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.7405999898910522},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.6277999877929688},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6241000294685364},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5903000235557556},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.47870001196861267},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.40689998865127563}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8429999947547913},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.828499972820282},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7638999819755554},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.7405999898910522},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.6277999877929688},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6241000294685364},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5931000113487244},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5903000235557556},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.47870001196861267},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44110000133514404},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.40689998865127563},{"id":"https://openalex.org/C46149586","wikidata":"https://www.wikidata.org/wiki/Q11785332","display_name":"Monte Carlo tree search","level":3,"score":0.39989998936653137},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3905999958515167},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35760000348091125},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.3452000021934509},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3246999979019165},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2815000116825104},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2784999907016754},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.26930001378059387},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2021.3104140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3104140","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2103.13689","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2103.13689","pdf_url":"https://arxiv.org/pdf/2103.13689","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2103.13689","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2103.13689","pdf_url":"https://arxiv.org/pdf/2103.13689","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1873708986","display_name":null,"funder_award_id":"JCYJ20200109105008228","funder_id":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program"},{"id":"https://openalex.org/G362522271","display_name":null,"funder_award_id":"2019B010139003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4107012507","display_name":null,"funder_award_id":"2019B151502001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4871455045","display_name":null,"funder_award_id":"U19B2022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4937944944","display_name":null,"funder_award_id":"61872244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7158506728","display_name":null,"funder_award_id":"2019B010139003","funder_id":"https://openalex.org/F4320336405","funder_display_name":"Special Project for Research and Development in Key areas of Guangdong Province"},{"id":"https://openalex.org/G7251903255","display_name":null,"funder_award_id":"61772349","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8617609110","display_name":null,"funder_award_id":"2019B151502001","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329801","display_name":"Shenzhen Research and Development Program","ror":null},{"id":"https://openalex.org/F4320336405","display_name":"Special Project for Research and Development in Key areas of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1604614341","https://openalex.org/W1955882805","https://openalex.org/W1965064373","https://openalex.org/W1973466159","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2055625960","https://openalex.org/W2081564928","https://openalex.org/W2096156898","https://openalex.org/W2097435234","https://openalex.org/W2108598243","https://openalex.org/W2111900533","https://openalex.org/W2124664712","https://openalex.org/W2126316555","https://openalex.org/W2134527668","https://openalex.org/W2154026545","https://openalex.org/W2156722235","https://openalex.org/W2168405694","https://openalex.org/W2170598445","https://openalex.org/W2257979135","https://openalex.org/W2277839806","https://openalex.org/W2322622188","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2565257220","https://openalex.org/W2597305026","https://openalex.org/W2610979719","https://openalex.org/W2621048556","https://openalex.org/W2680958618","https://openalex.org/W2735904389","https://openalex.org/W2751202750","https://openalex.org/W2766447205","https://openalex.org/W2775462490","https://openalex.org/W2809534270","https://openalex.org/W2892948265","https://openalex.org/W2949862294","https://openalex.org/W2963957509","https://openalex.org/W3013708462","https://openalex.org/W3037681428","https://openalex.org/W3044394060","https://openalex.org/W3088440139","https://openalex.org/W3092405519","https://openalex.org/W6640300313","https://openalex.org/W6662048488","https://openalex.org/W6696876242","https://openalex.org/W6762718338","https://openalex.org/W6766445928","https://openalex.org/W6791010997","https://openalex.org/W6797738698"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"research":[1],"has":[2,126],"shown":[3],"that":[4,148],"non-additive":[5,27,47,61,132],"image":[6,42],"steganographic":[7,62,133],"frameworks":[8],"effectively":[9,151],"improve":[10],"security":[11,169],"performance":[12,170],"through":[13],"adjusting":[14],"distortion":[15,63,99],"distribution.":[16],"However,":[17],"as":[18,20],"far":[19],"we":[21,57,79],"know,":[22],"all":[23],"of":[24,155,171,177],"the":[25,70,75,128,153,168,175,178],"existing":[26],"proposals":[28],"are":[29],"based":[30],"on":[31],"handcrafted":[32],"policies,":[33],"and":[34,86,121,141,159,165],"can":[35,136,150],"only":[36],"be":[37],"applied":[38],"to":[39,68,90,97,110,117],"a":[40,181],"specific":[41],"domain,":[43],"which":[44,135],"heavily":[45],"prevent":[46],"steganography":[48],"from":[49,113],"releasing":[50],"its":[51,118],"full":[52],"potentiality.":[53],"In":[54,162],"this":[55],"paper,":[56],"propose":[58],"an":[59],"automatic":[60],"learning":[64,77],"framework":[65,134],"called":[66],"MCTSteg":[67,125,149,172],"remove":[69],"above":[71],"restrictions.":[72],"Guided":[73],"by":[74,180],"reinforcement":[76],"paradigm,":[78],"combine":[80],"Monte":[81],"Carlo":[82],"Tree":[83],"Search":[84],"(MCTS)":[85],"steganalyzer-based":[87],"environmental":[88,106],"model":[89,107],"build":[91],"MCTSteg.":[92],"MCTS":[93],"makes":[94],"sequential":[95],"decisions":[96],"adjust":[98],"distribution":[100],"without":[101],"human":[102],"intervention.":[103],"Our":[104],"proposed":[105],"is":[108],"used":[109],"obtain":[111],"feedbacks":[112],"each":[114],"decision.":[115],"Due":[116],"self-learning":[119],"characteristic":[120],"domain-independent":[122],"reward":[123],"function,":[124],"become":[127],"first":[129],"reported":[130],"universal":[131],"work":[137],"in":[138],"both":[139,156,163],"spatial":[140,164],"JPEG":[142,166],"domains.":[143],"Extensive":[144],"experimental":[145],"results":[146],"show":[147],"withstand":[152],"detection":[154],"hand-crafted":[157],"feature-based":[158],"deep-learning-based":[160],"steganalyzers.":[161],"domains,":[167],"steadily":[173],"outperforms":[174],"state":[176],"art":[179],"clear":[182],"margin":[183],"under":[184],"different":[185],"scenarios.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-03-29T00:00:00"}
