{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:22Z","timestamp":1742912122008,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031546044"},{"type":"electronic","value":"9783031546051"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54605-1_36","type":"book-chapter","created":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:43:10Z","timestamp":1709811790000},"page":"558-573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Perturbations Straight on\u00a0JPEG Coefficients"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2889-5504","authenticated-orcid":false,"given":"Kolja","family":"Sielmann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8079-2797","authenticated-orcid":false,"given":"Peer","family":"Stelldinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed, N., Natarajan, T., Rao, K.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90\u201393 (1974). https:\/\/doi.org\/10.1109\/T-C.1974.223784","DOI":"10.1109\/T-C.1974.223784"},{"key":"36_CR2","doi-asserted-by":"publisher","unstructured":"Bernhard, R., et al.: Impact of spatial frequency based constraints on adversarial robustness. In: International Joint Conference on Neural Networks, IJCNN (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534307","DOI":"10.1109\/IJCNN52387.2021.9534307"},{"key":"36_CR3","doi-asserted-by":"publisher","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017). https:\/\/doi.org\/10.1109\/SP.2017.49","DOI":"10.1109\/SP.2017.49"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13), 2768\u20132786 (2007). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025507001016","DOI":"10.1016\/j.ins.2007.02.019"},{"key":"36_CR5","unstructured":"Das, N., et al.: Keeping the bad guys out: Protecting and vaccinating deep learning with JPEG compression. CoRR (2017). http:\/\/arxiv.org\/abs\/1705.02900"},{"key":"36_CR6","unstructured":"Dziugaite, G.K., Ghahramani, Z., Roy, D.M.: A study of the effect of JPG compression on adversarial images. CoRR (2016). http:\/\/arxiv.org\/abs\/1608.00853"},{"key":"36_CR7","unstructured":"Geirhos, R., Rubisch, P., Michaelis, C., Bethge, M., Wichmann, F.A., Brendel, W.: ImageNet-trained CNNs are biased towards texture; increasing shape bias improves accuracy and robustness. In: International Conference on Learning Representations, ICLR (2019). https:\/\/openreview.net\/forum?id=Bygh9j09KX"},{"key":"36_CR8","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: International Conference on Learning Representations, ICLR (2015)"},{"key":"36_CR9","unstructured":"Guo, C., Frank, J.S., Weinberger, K.Q.: Low frequency adversarial perturbation. In: Uncertainty in Artificial Intelligence Conference. PMLR 115 (2020). https:\/\/proceedings.mlr.press\/v115\/guo20a.html"},{"key":"36_CR10","unstructured":"Guo, C., Rana, M., Ciss\u00e9, M., van\u00a0der Maaten, L.: Countering adversarial images using input transformations. In: International Conference on Learning Representations, ICLR (2018). https:\/\/openreview.net\/forum?id=SyJ7ClWCb"},{"key":"36_CR11","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"36_CR12","doi-asserted-by":"publisher","unstructured":"Huang, G., Liu, Z., van der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2017). https:\/\/doi.org\/10.1109\/CVPR.2017.243","DOI":"10.1109\/CVPR.2017.243"},{"key":"36_CR13","unstructured":"Jordan, M., Manoj, N., Goel, S., Dimakis, A.G.: Quantifying perceptual distortion of adversarial examples. CoRR (2019). https:\/\/arxiv.org\/abs\/1902.08265"},{"issue":"3","key":"36_CR14","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10586-020-03215-x","volume":"24","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane, F., Khaldi, A., Kafi, R., Euschi, S.: A robust blind medical image watermarking approach for telemedicine applications. Clust. Comput. 24(3), 2069\u20132082 (2021)","journal-title":"Clust. Comput."},{"key":"36_CR15","unstructured":"Kang, D., Sun, Y., Hendrycks, D., Brown, T., Steinhardt, J.: Testing robustness against unforeseen adversaries. CoRR abs\/1908.08016 (2019). http:\/\/arxiv.org\/abs\/1908.08016"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Khan, S., et al.: On hiding secret information in medium frequency DCT components using least significant bits steganography. CMES-Comput. Model. Eng. Sci. 118(3) (2019)","DOI":"10.31614\/cmes.2019.06179"},{"key":"36_CR17","unstructured":"Krizhevsky, A.: Learning multiple layers of features from tiny images. University of Toronto (2012). https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I.J., Bengio, S.: Adversarial examples in the physical world. In: International Conference on Learning Representations, ICLR (2017). https:\/\/openreview.net\/forum?id=HJGU3Rodl","DOI":"10.1201\/9781351251389-8"},{"key":"36_CR19","unstructured":"Laidlaw, C., Singla, S., Feizi, S.: Perceptual adversarial robustness: defense against unseen threat models. In: International Conference on Learning Representations, ICLR (2021). https:\/\/openreview.net\/forum?id=dFwBosAcJkN"},{"issue":"5","key":"36_CR20","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1002\/col.1049","volume":"26","author":"MR Luo","year":"2001","unstructured":"Luo, M.R., Cui, G., Rigg, B.: The development of the CIE 2000 colour-difference formula: CIEDE2000. Color Res. Appl. 26(5), 340\u2013350 (2001). https:\/\/doi.org\/10.1002\/col.1049","journal-title":"Color Res. Appl."},{"issue":"4","key":"36_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/38.773961","volume":"19","author":"L MacDonald","year":"1999","unstructured":"MacDonald, L.: Using color effectively in computer graphics. IEEE Comput. Graph. Appl. 19(4), 20\u201335 (1999). https:\/\/doi.org\/10.1109\/38.773961","journal-title":"IEEE Comput. Graph. Appl."},{"key":"36_CR22","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., Vladu, A.: Towards deep learning models resistant to adversarial attacks. In: International Conference on Learning Representations, ICLR (2018). https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"key":"36_CR23","unstructured":"Maiya, S.R., Ehrlich, M., Agarwal, V., Lim, S., Goldstein, T., Shrivastava, A.: A frequency perspective of adversarial robustness. CoRR (2021). https:\/\/arxiv.org\/abs\/2111.00861"},{"issue":"3","key":"36_CR24","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1145\/1141911.1141919","volume":"25","author":"A Oliva","year":"2006","unstructured":"Oliva, A., Torralba, A., Schyns, P.G.: Hybrid images. ACM Trans. Graph. 25(3), 527\u2013532 (2006). https:\/\/doi.org\/10.1145\/1141911.1141919","journal-title":"ACM Trans. Graph."},{"key":"36_CR25","doi-asserted-by":"publisher","unstructured":"Pestana, C., Akhtar, N., Liu, W., Glance, D., Mian, A.: Adversarial attacks and defense on deep learning classification models using YCbCr color images. In: International Joint Conference on Neural Networks, IJCNN (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9533495","DOI":"10.1109\/IJCNN52387.2021.9533495"},{"key":"36_CR26","doi-asserted-by":"publisher","unstructured":"Plataniotis, K., Venetsanopoulos, A.N.: Color Image Processing and Applications. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/978-3-662-04186-4","DOI":"10.1007\/978-3-662-04186-4"},{"key":"36_CR27","doi-asserted-by":"publisher","unstructured":"Pradhan, C., Saxena, V., Bisoi, A.K.: Non blind digital watermarking technique using DCT and cross chaos map. In: International Conference on Communications, Devices and Intelligent Systems, CODIS (2012). https:\/\/doi.org\/10.1109\/CODIS.2012.6422191","DOI":"10.1109\/CODIS.2012.6422191"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Raff, E., Sylvester, J., Forsyth, S., McLean, M.: Barrage of random transforms for adversarially robust defense. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR (2019)","DOI":"10.1109\/CVPR.2019.00669"},{"issue":"3","key":"36_CR29","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren, K., Zheng, T., Qin, Z., Liu, X.: Adversarial attacks and defenses in deep learning. Engineering 6(3), 346\u2013360 (2020). https:\/\/doi.org\/10.1016\/j.eng.2019.12.012","journal-title":"Engineering"},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115, 211\u2013252 (2014). https:\/\/www.image-net.org\/","DOI":"10.1007\/s11263-015-0816-y"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, Y., Ding, G.W., Brubaker, M.A.: On the effectiveness of low frequency perturbations. In: International Joint Conference on Artificial Intelligence, IJCAI (2019)","DOI":"10.24963\/ijcai.2019\/470"},{"key":"36_CR32","doi-asserted-by":"publisher","unstructured":"Shi, M., Li, S., Yin, Z., Zhang, X., Qian, Z.: On generating JPEG adversarial images. In: IEEE International Conference on Multimedia and Expo, ICME (2021). https:\/\/doi.org\/10.1109\/ICME51207.2021.9428243","DOI":"10.1109\/ICME51207.2021.9428243"},{"key":"36_CR33","unstructured":"Shin, R., Song, D.: JPEG-resistant adversarial images. In: NIPS 2017 Workshop on Machine Learning and Computer Security, NeuRIPS (2017)"},{"key":"36_CR34","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. In: International Conference on Learning Representations, ICLR (2014)"},{"key":"36_CR35","unstructured":"Tsipras, D., Santurkar, S., Engstrom, L., Turner, A., Madry, A.: Robustness may be at odds with accuracy. In: International Conference on Learning Representations, ICLR (2019). https:\/\/openreview.net\/forum?id=SyxAb30cY7"},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Tsuzuku, Y., Sato, I.: On the structural sensitivity of deep convolutional networks to the directions of Fourier basis functions. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR (2019)","DOI":"10.1109\/CVPR.2019.00014"},{"key":"36_CR37","unstructured":"Yin, D., Gontijo\u00a0Lopes, R., Shlens, J., Cubuk, E.D., Gilmer, J.: A Fourier perspective on model robustness in computer vision. In: Advances in Neural Information Processing Systems, NeuRIPS (2019). https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/b05b57f6add810d3b7490866d74c0053-Paper.pdf"},{"key":"36_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, R., Isola, P., Efros, A.A., Shechtman, E., Wang, O.: The unreasonable effectiveness of deep features as a perceptual metric. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2018)","DOI":"10.1109\/CVPR.2018.00068"},{"key":"36_CR39","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z., Larson, M.: Towards large yet imperceptible adversarial image perturbations with perceptual color distance. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR (2020)","DOI":"10.1109\/CVPR42600.2020.00112"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54605-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:12:28Z","timestamp":1709813548000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54605-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031546044","9783031546051"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54605-1_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"8 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DAGM GCPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"DAGM German Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heidelberg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dagm2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dagm-gcpr.de\/year\/2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}