{"id":"https://openalex.org/W4411337432","doi":"https://doi.org/10.1109/sp61157.2025.00155","title":"Provably Robust and Secure Steganography in Asymmetric Resource Scenario","display_name":"Provably Robust and Secure Steganography in Asymmetric Resource Scenario","publication_year":2025,"publication_date":"2025-05-12","ids":{"openalex":"https://openalex.org/W4411337432","doi":"https://doi.org/10.1109/sp61157.2025.00155"},"language":"en","primary_location":{"id":"doi:10.1109/sp61157.2025.00155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp61157.2025.00155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051750999","display_name":"Minhao Bai","orcid":"https://orcid.org/0009-0000-9069-6053"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minhao Bai","raw_affiliation_strings":["Tsinghua University,Department of electronic engineering"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of electronic engineering","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035279134","display_name":"Jinshuai Yang","orcid":"https://orcid.org/0000-0002-6293-1981"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshuai Yang","raw_affiliation_strings":["Tsinghua University,Department of electronic engineering"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of electronic engineering","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026392581","display_name":"Kaiyi Pang","orcid":"https://orcid.org/0000-0003-0248-171X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiyi Pang","raw_affiliation_strings":["Tsinghua University,Department of electronic engineering"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of electronic engineering","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100319817","display_name":"Xin Xu","orcid":"https://orcid.org/0009-0002-2319-1682"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xu","raw_affiliation_strings":["Tsinghua University,Department of electronic engineering"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of electronic engineering","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060525920","display_name":"Zhen Yang","orcid":"https://orcid.org/0000-0001-9289-4600"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100755262","display_name":"Yongfeng Huang","orcid":"https://orcid.org/0000-0001-5185-491X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongfeng Huang","raw_affiliation_strings":["Tsinghua University,Department of electronic engineering"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of electronic engineering","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5051750999"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.2732,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8848426,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1438","last_page":"1456"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7494696974754333},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6716960668563843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.485378623008728},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42583024501800537},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3211349844932556},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15214067697525024},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.14412730932235718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494696974754333},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6716960668563843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.485378623008728},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42583024501800537},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3211349844932556},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15214067697525024},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.14412730932235718}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp61157.2025.00155","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp61157.2025.00155","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.41999998688697815,"display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G5798674457","display_name":null,"funder_award_id":"U2336208,U21B2020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1479681406","https://openalex.org/W1512190422","https://openalex.org/W1527181506","https://openalex.org/W1594271205","https://openalex.org/W1785692036","https://openalex.org/W1878459630","https://openalex.org/W1878907771","https://openalex.org/W1978627933","https://openalex.org/W2031029123","https://openalex.org/W2096050104","https://openalex.org/W2103013014","https://openalex.org/W2103228545","https://openalex.org/W2109394932","https://openalex.org/W2163861376","https://openalex.org/W2167577564","https://openalex.org/W2618218947","https://openalex.org/W2776888948","https://openalex.org/W2893556909","https://openalex.org/W2962928921","https://openalex.org/W2963444877","https://openalex.org/W2971140743","https://openalex.org/W3085519426","https://openalex.org/W3101022597","https://openalex.org/W3175755605","https://openalex.org/W3211484452","https://openalex.org/W4250351803","https://openalex.org/W4253000688","https://openalex.org/W4307479070","https://openalex.org/W4380032289","https://openalex.org/W4384948607","https://openalex.org/W4391430021","https://openalex.org/W4401632008","https://openalex.org/W6641447691","https://openalex.org/W6848955896","https://openalex.org/W6853921302","https://openalex.org/W6854866820","https://openalex.org/W6858023062"],"related_works":["https://openalex.org/W2138457032","https://openalex.org/W2588780717","https://openalex.org/W3133799264","https://openalex.org/W1852022489","https://openalex.org/W2891774131","https://openalex.org/W2060145807","https://openalex.org/W4248806346","https://openalex.org/W4307248189","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"To":[0,86],"circumvent":[1],"the":[2,48,52,65,77,83,88,94,114,124,129,149,154,166,175,180,184,189,196],"unbridled":[3],"and":[4,7,35,39,76,92,102,118,144,202],"ever-encroaching":[5],"surveillance":[6],"censorship":[8],"in":[9,22],"cyberspace,":[10],"steganography":[11,28,146],"has":[12],"garnered":[13],"attention":[14],"for":[15,148],"its":[16,216],"ability":[17],"to":[18,37,55,64,73,82,120,161,173,212],"hide":[19,38,162],"private":[20,41],"information":[21],"innocent-looking":[23],"carriers.":[24],"Current":[25],"provably":[26,142],"secure":[27,145],"approaches":[29],"require":[30],"a":[31,100,140,170],"pair":[32],"of":[33,44,68,79,90,96,159,199,208],"encoder":[34,115,155],"decoder":[36,125,167,197],"extract":[40,174],"messages,":[42],"both":[43],"which":[45,194],"must":[46],"run":[47],"same":[49,53],"model":[50,203],"with":[51,106,228],"input":[54,201],"obtain":[56],"identical":[57],"distributions.":[58],"These":[59],"requirements":[60],"pose":[61],"significant":[62,104],"challenges":[63],"practical":[66],"implementation":[67,219],"steganography,":[69],"including":[70],"limited":[71],"access":[72],"powerful":[74,121],"hardware":[75,91],"intolerance":[78],"any":[80,133],"changes":[81],"shared":[84,98],"input.":[85,136],"relax":[87],"limitation":[89],"solve":[93],"challenge":[95],"vulnerable":[97],"input,":[99,193],"novel":[101,141],"practically":[103],"scenario":[105],"asymmetric":[107,150],"resource":[108,151],"should":[109],"be":[110],"considered,":[111],"where":[112],"only":[113,127,187],"is":[116],"high-resource":[117],"accessible":[119],"models":[122,214],"while":[123,165],"can":[126],"read":[128],"stegano-graphic":[130],"carriers":[131],"without":[132],"other":[134],"model's":[135,200],"This":[137],"paper":[138],"proposes":[139],"robust":[143],"framework":[147,211],"setting.":[152],"Specifically,":[153],"uses":[156],"various":[157],"permutations":[158],"distribution":[160],"secret":[163],"bits,":[164],"relies":[168],"on":[169],"sampling":[171,185],"function":[172,186],"hidden":[176],"bits":[177],"by":[178],"guessing":[179],"permutation":[181],"used.":[182],"Further,":[183],"takes":[188],"steganographic":[190],"carrier":[191],"as":[192],"makes":[195],"independent":[198],"itself.":[204],"A":[205],"comprehensive":[206],"assessment":[207],"applying":[209],"our":[210],"generative":[213],"substantiates":[215],"effectiveness.":[217],"Our":[218],"demonstrates":[220],"robustness":[221],"when":[222],"transmitting":[223],"over":[224],"binary":[225],"symmetric":[226],"channels":[227],"errors.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
