{"id":"https://openalex.org/W4405181419","doi":"https://doi.org/10.1145/3658644.3690218","title":"Pulsar: Secure Steganography for Diffusion Models","display_name":"Pulsar: Secure Steganography for Diffusion Models","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181419","doi":"https://doi.org/10.1145/3658644.3690218"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690218","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690218","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690218","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690218","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027680930","display_name":"Tushar M. Jois","orcid":"https://orcid.org/0000-0002-2740-8407"},"institutions":[{"id":"https://openalex.org/I125687163","display_name":"City College of New York","ror":"https://ror.org/00wmhkr98","country_code":"US","type":"education","lineage":["https://openalex.org/I125687163"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tushar M. Jois","raw_affiliation_strings":["City College of New York, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"City College of New York, New York, NY, USA","institution_ids":["https://openalex.org/I125687163"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037548263","display_name":"Gabrielle Beck","orcid":"https://orcid.org/0009-0006-0026-5094"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabrielle Beck","raw_affiliation_strings":["Johns Hopkins University, Baltimore, MD, USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091589622","display_name":"Gabriel Kaptchuk","orcid":"https://orcid.org/0000-0002-8886-4748"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gabriel Kaptchuk","raw_affiliation_strings":["University of Maryland, College Park, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027680930"],"corresponding_institution_ids":["https://openalex.org/I125687163"],"apc_list":null,"apc_paid":null,"fwci":1.0526,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79194589,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"4703","last_page":"4717"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.815222978591919},{"id":"https://openalex.org/keywords/pulsar","display_name":"Pulsar","score":0.7139501571655273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7093861103057861},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.545626163482666},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5349233150482178},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.49941253662109375},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48254746198654175},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4264109432697296},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.42416179180145264},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4149722456932068},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4108123779296875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3599947690963745},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10790064930915833},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09276804327964783},{"id":"https://openalex.org/keywords/astronomy","display_name":"Astronomy","score":0.08720120787620544},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.08582523465156555}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.815222978591919},{"id":"https://openalex.org/C110363677","wikidata":"https://www.wikidata.org/wiki/Q4360","display_name":"Pulsar","level":2,"score":0.7139501571655273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7093861103057861},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.545626163482666},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5349233150482178},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.49941253662109375},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48254746198654175},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4264109432697296},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.42416179180145264},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4149722456932068},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4108123779296875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3599947690963745},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10790064930915833},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09276804327964783},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.08720120787620544},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.08582523465156555},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690218","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690218","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690218","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690218","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690218","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690218","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181419.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W1591473542","https://openalex.org/W1608307946","https://openalex.org/W1750309227","https://openalex.org/W1981790149","https://openalex.org/W1985776777","https://openalex.org/W2005708967","https://openalex.org/W2086881506","https://openalex.org/W2094522125","https://openalex.org/W2096050104","https://openalex.org/W2123243822","https://openalex.org/W2138109426","https://openalex.org/W2161022751","https://openalex.org/W2162174114","https://openalex.org/W2167999072","https://openalex.org/W2209711601","https://openalex.org/W2618218947","https://openalex.org/W2621048556","https://openalex.org/W2788138676","https://openalex.org/W2808467956","https://openalex.org/W2860433205","https://openalex.org/W2892948265","https://openalex.org/W2893556909","https://openalex.org/W2915352631","https://openalex.org/W2919023666","https://openalex.org/W2963444877","https://openalex.org/W2966848889","https://openalex.org/W3008940280","https://openalex.org/W3100675441","https://openalex.org/W3182074013","https://openalex.org/W3211484452","https://openalex.org/W3215735523","https://openalex.org/W4212774754","https://openalex.org/W4214543711","https://openalex.org/W4285284741","https://openalex.org/W4288401700","https://openalex.org/W4298403653","https://openalex.org/W4312906123","https://openalex.org/W4312933868","https://openalex.org/W4387969350","https://openalex.org/W4388624454"],"related_works":["https://openalex.org/W1975075502","https://openalex.org/W2148103048","https://openalex.org/W1768009424","https://openalex.org/W1666170085","https://openalex.org/W2054351791","https://openalex.org/W2138457032","https://openalex.org/W2588780717","https://openalex.org/W3133799264","https://openalex.org/W1852022489","https://openalex.org/W2891774131"],"abstract_inverted_index":{"Widespread":[0],"efforts":[1,24],"to":[2,5,93],"subvert":[3],"access":[4],"strong":[6],"cryptography":[7],"has":[8],"renewed":[9],"interest":[10],"in":[11,19,125],"steganography,":[12],"the":[13,63,72,118,121,140],"practice":[14],"of":[15,40,65,74,102,106,120,129,142],"embedding":[16,59,107],"sensitive":[17],"messages":[18,61],"mundane":[20],"cover":[21],"messages.":[22],"Recent":[23],"at":[25],"provably":[26],"secure":[27],"steganography":[28,161],"have":[29],"focused":[30],"on":[31,132],"text-based":[32],"generative":[33],"models":[34,155],"and":[35,162],"cannot":[36],"support":[37],"other":[38],"types":[39],"models,":[41,45],"such":[42],"as":[43],"diffusion":[44,67,149,154],"which":[46],"are":[47,156],"used":[48],"for":[49,98,160],"high-quality":[50],"image":[51,66,78,115],"synthesis.":[52],"In":[53,135],"this":[54,95],"work,":[55],"we":[56,137],"study":[57],"securely":[58],"steganographic":[60,83],"into":[62,112,148],"output":[64],"models.":[68,150],"We":[69,85],"identify":[70],"that":[71,153],"use":[73],"variance":[75],"noise":[76],"during":[77],"generation":[79],"provides":[80],"a":[81,113,133,157],"suitable":[82],"channel.":[84],"develop":[86],"our":[87],"construction,":[88],"Pulsar,":[89],"by":[90],"building":[91],"optimizations":[92],"make":[94],"channel":[96],"practical":[97],"communication.":[99],"Our":[100],"implementation":[101],"Pulsar":[103,143,151],"is":[104],"capable":[105],"\u2248320--613":[108],"bytes":[109],"(on":[110],"average)":[111],"single":[114],"without":[116],"altering":[117],"distribution":[119],"generated":[122],"image,":[123],"all":[124],"<":[126],"3":[127],"seconds":[128],"online":[130],"time":[131],"laptop.":[134],"addition,":[136],"discuss":[138],"how":[139],"results":[141],"can":[144],"inform":[145],"future":[146],"research":[147],"shows":[152],"promising":[158],"medium":[159],"censorship":[163],"resistance.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
