{"id":"https://openalex.org/W4400231073","doi":"https://doi.org/10.1109/tifs.2024.3421893","title":"Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography","display_name":"Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400231073","doi":"https://doi.org/10.1109/tifs.2024.3421893"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3421893","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3421893","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2409.04968","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101213274","display_name":"Zexin Fan","orcid":"https://orcid.org/0009-0001-6371-791X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zexin Fan","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0009-0001-6371-791X","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045121980","display_name":"Kejiang Chen","orcid":"https://orcid.org/0000-0002-9868-3414"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kejiang Chen","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0002-9868-3414","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080049509","display_name":"Kai Zeng","orcid":"https://orcid.org/0009-0007-6275-9767"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zeng","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0009-0007-6275-9767","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630299","display_name":"Jiansong Zhang","orcid":"https://orcid.org/0000-0001-9288-8665"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiansong Zhang","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0001-9288-8665","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067689180","display_name":"Weiming Zhang","orcid":"https://orcid.org/0000-0001-5576-6108"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiming Zhang","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0001-5576-6108","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064573190","display_name":"Nenghai Yu","orcid":"https://orcid.org/0000-0003-4417-9316"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nenghai Yu","raw_affiliation_strings":["CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-4417-9316","affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of Electromagnetic Space Information and Anhui Province Key Laboratory of Digital Security, School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101213274"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":1.1904,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79503174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"19","issue":null,"first_page":"6636","last_page":"6649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8199685215950012},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5946792960166931},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5860016942024231},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5141663551330566},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4704738259315491},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4510868191719055},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.44161397218704224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34779471158981323}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8199685215950012},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5946792960166931},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5860016942024231},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5141663551330566},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4704738259315491},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4510868191719055},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.44161397218704224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34779471158981323}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2024.3421893","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3421893","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2409.04968","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.04968","pdf_url":"https://arxiv.org/pdf/2409.04968","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2409.04968","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2409.04968","pdf_url":"https://arxiv.org/pdf/2409.04968","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3828173677","display_name":null,"funder_award_id":"62121002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4278025092","display_name":null,"funder_award_id":"62072421","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4538375728","display_name":null,"funder_award_id":"U2336206","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4838404910","display_name":null,"funder_award_id":"62102386","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6040923174","display_name":null,"funder_award_id":"62372423","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Image":[0],"steganography":[1,39,67,159],"is":[2],"a":[3,36,97,111],"technique":[4,168],"to":[5,17,45,48,68,88,114,122],"conceal":[6],"secret":[7,22],"messages":[8,23],"within":[9,24],"digital":[10],"images.":[11,25],"Steganalysis,":[12],"on":[13],"the":[14,19,63,108,118,144],"contrary,":[15],"aims":[16],"detect":[18],"presence":[20],"of":[21,65,110,146],"Recently,":[26],"deep-learning-based":[27,51],"steganalysis":[28],"methods":[29,83],"have":[30],"achieved":[31],"excellent":[32],"detection":[33],"performance.":[34],"As":[35],"countermeasure,":[37],"adversarial":[38,66,81,99,147,158],"has":[40],"garnered":[41],"considerable":[42],"attention":[43],"due":[44],"its":[46],"ability":[47,64],"effectively":[49],"deceive":[50,69],"steganalysis.":[52],"However,":[53],"steganalysts":[54],"often":[55],"employ":[56],"unknown":[57],"steganalytic":[58,71,112,138],"models":[59],"for":[60],"detection.":[61],"Therefore,":[62],"non-target":[70],"models,":[72],"known":[73],"as":[74],"transferability,":[75],"becomes":[76],"especially":[77],"important.":[78],"Nevertheless,":[79],"existing":[80,157],"steganographic":[82,100],"do":[84],"not":[85],"consider":[86],"how":[87],"enhance":[89],"transferability.":[90],"To":[91],"address":[92],"this":[93],"issue,":[94],"we":[95,105,127],"propose":[96],"novel":[98],"scheme":[101],"named":[102],"Natias.":[103],"Specifically,":[104],"first":[106],"attribute":[107],"output":[109],"model":[113],"each":[115],"neuron":[116],"in":[117,182],"target":[119],"middle":[120],"layer":[121],"identify":[123],"critical":[124,130],"features.":[125],"Next,":[126],"corrupt":[128],"these":[129],"features":[131],"that":[132,165],"may":[133],"be":[134,153],"adopted":[135],"by":[136],"diverse":[137],"models.":[139],"Consequently,":[140],"it":[141,178],"can":[142,152],"promote":[143],"transferability":[145,171],"steganography.":[148],"Our":[149],"proposed":[150,167],"method":[151],"seamlessly":[154],"integrated":[155],"with":[156,174],"frameworks.":[160],"Thorough":[161],"experimental":[162],"analyses":[163],"affirm":[164],"our":[166],"possesses":[169],"improved":[170],"when":[172],"contrasted":[173],"former":[175],"approaches,":[176],"and":[177],"attains":[179],"heightened":[180],"security":[181],"retraining":[183],"scenarios.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2024-07-03T00:00:00"}
