{"id":"https://openalex.org/W4319878878","doi":"https://doi.org/10.1109/tifs.2023.3244094","title":"ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography","display_name":"ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4319878878","doi":"https://doi.org/10.1109/tifs.2023.3244094"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3244094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3244094","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043791595","display_name":"Xianbo Mo","orcid":"https://orcid.org/0000-0001-9198-5041"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0001-9198-5041","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7457-3691","affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011972758","display_name":"Weixuan Tang","orcid":"https://orcid.org/0000-0002-4082-1140"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixuan Tang","raw_affiliation_strings":["Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4082-1140","affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-2613-5451","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7625-5689","affiliations":[{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043791595"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":4.2389,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.95563937,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"1524","last_page":"1538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.892258882522583},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7765028476715088},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7415056228637695},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.7321587204933167},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.7107270956039429},{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.6456773281097412},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4801711142063141},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.4703502953052521},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42901232838630676},{"id":"https://openalex.org/keywords/distortion-function","display_name":"Distortion function","score":0.42895275354385376},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.39263904094696045},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34545063972473145},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09915211796760559}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.892258882522583},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7765028476715088},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7415056228637695},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.7321587204933167},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.7107270956039429},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.6456773281097412},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4801711142063141},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.4703502953052521},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42901232838630676},{"id":"https://openalex.org/C2780803321","wikidata":"https://www.wikidata.org/wiki/Q5283073","display_name":"Distortion function","level":3,"score":0.42895275354385376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.39263904094696045},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34545063972473145},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09915211796760559},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3244094","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3244094","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[{"id":"https://openalex.org/G1873708986","display_name":null,"funder_award_id":"JCYJ20200109105008228","funder_id":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program"},{"id":"https://openalex.org/G1961232708","display_name":null,"funder_award_id":"U22B2047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3775595010","display_name":null,"funder_award_id":"62272314","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4871455045","display_name":null,"funder_award_id":"U19B2022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5666409524","display_name":null,"funder_award_id":"62002075","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8617609110","display_name":null,"funder_award_id":"2019B151502001","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329801","display_name":"Shenzhen Research and Development Program","ror":null},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1604614341","https://openalex.org/W1901129140","https://openalex.org/W1965064373","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2081564928","https://openalex.org/W2108598243","https://openalex.org/W2124664712","https://openalex.org/W2134527668","https://openalex.org/W2139842737","https://openalex.org/W2170598445","https://openalex.org/W2192227561","https://openalex.org/W2277839806","https://openalex.org/W2322622188","https://openalex.org/W2565257220","https://openalex.org/W2588785614","https://openalex.org/W2597305026","https://openalex.org/W2751202750","https://openalex.org/W2792207818","https://openalex.org/W2794584741","https://openalex.org/W2892948265","https://openalex.org/W2949862294","https://openalex.org/W2996678997","https://openalex.org/W3013708462","https://openalex.org/W3037681428","https://openalex.org/W3046549894","https://openalex.org/W3081541465","https://openalex.org/W3088440139","https://openalex.org/W3092405519","https://openalex.org/W3099900768","https://openalex.org/W3105479728","https://openalex.org/W3133932568","https://openalex.org/W3138564696","https://openalex.org/W3174051263","https://openalex.org/W3177469408","https://openalex.org/W3192789783","https://openalex.org/W3200766050","https://openalex.org/W3200967845","https://openalex.org/W3207199141","https://openalex.org/W4200085651","https://openalex.org/W4210377582","https://openalex.org/W4239092273","https://openalex.org/W4321617540","https://openalex.org/W6692846177","https://openalex.org/W6696876242","https://openalex.org/W6762718338"],"related_works":["https://openalex.org/W2148973528","https://openalex.org/W2939392096","https://openalex.org/W4243922849","https://openalex.org/W2106726851","https://openalex.org/W4309385482","https://openalex.org/W2068740952","https://openalex.org/W1583147569","https://openalex.org/W1716757876","https://openalex.org/W4388996884","https://openalex.org/W2527082845"],"abstract_inverted_index":{"Recently,":[0],"the":[1,39,71,81,84,101,110,165,179],"success":[2],"of":[3,23,64,86,103,112,169],"non-additive":[4,132,176],"steganography":[5,48,104,177],"has":[6],"demonstrated":[7],"that":[8,93,109,129,161],"asymmetric":[9,44],"distortion":[10,45,78],"can":[11,115],"remarkably":[12],"improve":[13],"security":[14,167],"performance":[15,85,168],"compared":[16,130],"with":[17,131,145],"symmetric":[18,33],"cost":[19],"functions.":[20],"However,":[21],"most":[22],"current":[24,170],"existing":[25],"additive":[26,47,171],"steganographic":[27,57],"methods":[28,172],"are":[29],"still":[30],"based":[31,56],"on":[32,152],"distortion.":[34,88],"In":[35],"this":[36],"paper,":[37],"for":[38,46,76],"first":[40],"time":[41],"we":[42],"optimize":[43],"and":[49,67,80,105,139,156,173],"propose":[50],"an":[51,65],"A3C":[52],"(Asynchronous":[53],"Advantage":[54],"Actor-Critic)":[55],"framework,":[58],"called":[59],"ReLOAD.":[60],"ReLOAD":[61,134,162],"is":[62,97],"composed":[63],"actor":[66],"a":[68,90],"critic,":[69],"where":[70],"former":[72],"guides":[73],"action":[74],"selection":[75],"pixel-wise":[77],"modulation,":[79],"latter":[82],"evaluates":[83],"modulated":[87],"Meanwhile,":[89],"reward":[91],"function":[92],"considers":[94],"embedding":[95,113,141],"effects":[96,114],"proposed":[98],"to":[99,122],"unify":[100],"goal":[102],"reinforcement":[106],"learning,":[107],"so":[108],"minimization":[111],"be":[116],"achieved":[117],"by":[118],"learning":[119],"secure":[120],"policy":[121],"maximize":[123],"total":[124],"rewards.":[125],"Statistical":[126],"analysis":[127],"shows":[128],"steganography,":[133],"achieves":[135],"lower":[136],"change":[137],"rates":[138],"makes":[140],"traces":[142],"more":[143],"consistent":[144],"cover":[146],"image":[147],"textures.":[148],"Comprehensive":[149],"experiments":[150],"conducted":[151],"both":[153],"hand-crafted":[154],"feature-based":[155],"deep":[157],"learning-based":[158],"steganalyzers":[159],"show":[160],"significantly":[163],"promotes":[164],"state-of-the-art":[166],"even":[174],"outperforms":[175],"when":[178],"modification":[180],"distribution":[181],"gets":[182],"sparser.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
