{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:26:17Z","timestamp":1743013577880,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T00:00:00Z","timestamp":1707955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T00:00:00Z","timestamp":1707955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18563-8","type":"journal-article","created":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T08:02:47Z","timestamp":1707984167000},"page":"74281-74300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Unveiling vulnerabilities: evading YOLOv5 object detection through adversarial perturbations and steganography"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9585-1868","authenticated-orcid":false,"given":"Gauri","family":"Sharma","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Urvashi","family":"Garg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,15]]},"reference":[{"key":"18563_CR1","unstructured":"(2021) Benign tumor - cleveland clinic. https:\/\/my.clevelandclinic.org\/health\/diseases\/22121-benign-tumor"},{"key":"18563_CR2","unstructured":"(2021) What is glioma - cleveland clinic. https:\/\/my.clevelandclinic.org\/health\/diseases\/21969-glioma"},{"key":"18563_CR3","unstructured":"(2022) Meningioma - symptoms and causes - mayo clinic. https:\/\/www.mayoclinic.org\/diseases-conditions\/meningioma\/symptoms-causes\/syc-20355643"},{"key":"18563_CR4","unstructured":"(n.d.) Pituitary tumors \u2013 johns hopkins medicine. https:\/\/www.hopkinsmedicine.org\/health\/conditions-and-diseases\/pituitary-tumors"},{"key":"18563_CR5","doi-asserted-by":"publisher","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","volume":"6","author":"N Akhtar","year":"2018","unstructured":"Akhtar N, Mian A (2018) Threat of adversarial attacks on deep learning in computer vision: a survey. IEEE Access 6:14410\u201314430","journal-title":"IEEE Access"},{"key":"18563_CR6","unstructured":"Antoniou N (2022) Improving projected gradient descent based adversarial attacks"},{"key":"18563_CR7","unstructured":"Anulyer (2023) Image steganography in cryptography - geeksforgeeks. https:\/\/www.geeksforgeeks.org\/image-steganography-in-cryptography\/"},{"key":"18563_CR8","doi-asserted-by":"crossref","unstructured":"Ayas MS, Ayas S, Djouadi SM (2022) Projected gradient descent adversarial attack and its defense on a fault diagnosis system. In: 2022 45th international conference on telecommunications and signal processing (TSP), IEEE, pp 36\u201339","DOI":"10.1109\/TSP55681.2022.9851334"},{"key":"18563_CR9","unstructured":"Baluja S (2017) Hiding images in plain sight: deep steganography. Advances in neural information processing systems 30"},{"issue":"C","key":"18563_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84(C):317\u2013331. https:\/\/doi.org\/10.1016\/j.patcog.2018.07.023","journal-title":"Pattern Recognit"},{"key":"18563_CR11","doi-asserted-by":"publisher","unstructured":"Bortsova G, Gonz\u00e1lez-Gonzalo C, Wetstein SC et al (2021) Adversarial attack vulnerability of medical image analysis systems: Unexplored factors. Med Image Anal 73:102141. https:\/\/doi.org\/10.1016\/j.media.2021.102141. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1361841521001870","DOI":"10.1016\/j.media.2021.102141"},{"key":"18563_CR12","doi-asserted-by":"crossref","unstructured":"Deng Y, Karam LJ (2020) Universal adversarial attack via enhanced projected gradient descent. In: 2020 IEEE international conference on image processing (ICIP), IEEE, pp 1241\u20131245","DOI":"10.1109\/ICIP40778.2020.9191288"},{"key":"18563_CR13","unstructured":"Dhankar A (2018) Ankit-dhankhar\/deep-steg - github"},{"key":"18563_CR14","unstructured":"Dickson B (2021) Adversarial attacks against machine learning systems - everything you need to know"},{"key":"18563_CR15","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T et\u00a0al (2017) Discovering adversarial examples with momentum. 5. arXiv:1710.06081","DOI":"10.1109\/CVPR.2018.00957"},{"key":"18563_CR16","doi-asserted-by":"crossref","unstructured":"Dong Y, Liao F, Pang T et\u00a0al (2018) Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 9185\u20139193","DOI":"10.1109\/CVPR.2018.00957"},{"key":"18563_CR17","doi-asserted-by":"crossref","unstructured":"Girshick R, Donahue J, Darrell T et\u00a0al (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580\u2013587","DOI":"10.1109\/CVPR.2014.81"},{"key":"18563_CR18","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2015) Explaining and harnessing adversarial examples. arXiv:1412.6572"},{"key":"18563_CR19","doi-asserted-by":"publisher","first-page":"268","DOI":"10.3390\/a13110268","volume":"13","author":"H Hirano","year":"2020","unstructured":"Hirano H, Takemoto K (2020) Simple iterative method for generating targeted universal adversarial perturbations. Algorithms 13:268. https:\/\/doi.org\/10.3390\/a13110268","journal-title":"Algorithms"},{"key":"18563_CR20","unstructured":"Horvat M, Jele\u010devi\u0107 L, Gledec G (2022) A comparative study of yolov5 models performance for image localization and classification"},{"key":"18563_CR21","doi-asserted-by":"publisher","unstructured":"Jassim FA (2013) A novel steganography method for hiding bw images into gray bitmap images via k-modulus method. Int J Adv Comput Sci Appl 4(8). https:\/\/doi.org\/10.14569\/IJACSA.2013.040836","DOI":"10.14569\/IJACSA.2013.040836"},{"key":"18563_CR22","first-page":"1","volume":"2021","author":"Y Jiang","year":"2021","unstructured":"Jiang Y, Yin G, Yuan Y et al (2021) Project gradient descent adversarial attack against multisource remote sensing image scene classification. Secur Commun Netw 2021:1\u201313","journal-title":"Secur Commun Netw"},{"key":"18563_CR23","doi-asserted-by":"publisher","unstructured":"Joel M, Umrao S, Chang E et al (2022) Using adversarial images to assess the robustness of deep learning models trained on diagnostic images in oncology. JCO Clin Cancer Inform 6. https:\/\/doi.org\/10.1200\/CCI.21.00170","DOI":"10.1200\/CCI.21.00170"},{"key":"18563_CR24","doi-asserted-by":"publisher","unstructured":"Kim JH, Kim N, Park YW et al (2022) Object detection and classification based on yolo-v5 with improved maritime dataset. Journal of Marine Science and Engineering 10(3):5. https:\/\/doi.org\/10.3390\/jmse10030377. https:\/\/www.mdpi.com\/2077-1312\/10\/3\/377","DOI":"10.3390\/jmse10030377"},{"key":"18563_CR25","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow I, Bengio S (2017a) Adversarial examples in the physical world. arXiv:1607.02533","DOI":"10.1201\/9781351251389-8"},{"key":"18563_CR26","unstructured":"Kurakin A, Goodfellow I, Bengio S (2017b) Adversarial machine learning at scale. arXiv:1611.01236"},{"key":"18563_CR27","doi-asserted-by":"publisher","unstructured":"Lee C, Lee S (2023) Evaluating the vulnerability of YOLOv5 to adversarial attacks for enhanced cybersecurity in mass. J Mar Sci Eng 11(5). https:\/\/doi.org\/10.3390\/jmse11050947. https:\/\/www.mdpi.com\/2077-1312\/11\/5\/947","DOI":"10.3390\/jmse11050947"},{"key":"18563_CR28","doi-asserted-by":"publisher","unstructured":"Li W, Wu S, Li B et\u00a0al (2023) Payload-independent direct cost learning for image steganography. IEEE Trans Circuits Syst Video Technol 1. https:\/\/doi.org\/10.1109\/TCSVT.2023.3294291","DOI":"10.1109\/TCSVT.2023.3294291"},{"issue":"3","key":"18563_CR29","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B et al (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"18563_CR30","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TDSC.2020.3004708","volume":"19","author":"X Liao","year":"2022","unstructured":"Liao X, Yin J, Chen M et al (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897\u2013911. https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"18563_CR31","unstructured":"Liiv T, Stromberg A (2019) Iterative gradient-based adversarial attacks on neural network image classifiers"},{"key":"18563_CR32","doi-asserted-by":"publisher","first-page":"103612","DOI":"10.1016\/j.csi.2021.103612","volume":"82","author":"J Liu","year":"2022","unstructured":"Liu J, Zhang Q, Mo K et al (2022) An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient. Comput Stand Interfaces 82:103612. https:\/\/doi.org\/10.1016\/j.csi.2021.103612","journal-title":"Comput Stand Interfaces"},{"key":"18563_CR33","doi-asserted-by":"publisher","unstructured":"Liu S, Zhang Z, Zhang X et\u00a0al (2020) F-MIFGSM: adversarial attack algorithm for the feature region. In: 2020 IEEE 9th joint international information technology and artificial intelligence conference (ITAIC), pp 2164\u20132170. https:\/\/doi.org\/10.1109\/ITAIC49862.2020.9338937","DOI":"10.1109\/ITAIC49862.2020.9338937"},{"key":"18563_CR34","unstructured":"Madry A, Makelov A, Schmidt L et\u00a0al (2017) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083"},{"key":"18563_CR35","doi-asserted-by":"publisher","first-page":"103124","DOI":"10.1016\/j.cose.2023.103124","volume":"127","author":"Z Mao","year":"2023","unstructured":"Mao Z, Lu Y, Cheng Z et al (2023) Boosting adversarial attacks with future momentum and future transformation. Comput Secur 127:103124","journal-title":"Comput Secur"},{"key":"18563_CR36","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10723-023-09684-9","volume":"21","author":"SMA Naqvi","year":"2023","unstructured":"Naqvi SMA, Shabaz M, Khan MA et al (2023) Adversarial attacks on visual objects using the fast gradient sign method. J Grid Comput 21:52. https:\/\/doi.org\/10.1007\/s10723-023-09684-9","journal-title":"J Grid Comput"},{"key":"18563_CR37","doi-asserted-by":"publisher","unstructured":"Redmon J, Divvala S, Girshick R et\u00a0al (2016) You only look once: unified, real-time object detection. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 779\u2013788. https:\/\/doi.org\/10.1109\/CVPR.2016.91","DOI":"10.1109\/CVPR.2016.91"},{"key":"18563_CR38","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.112442","author":"J Sen","year":"2023","unstructured":"Sen J, Dasgupta S (2023) Adversarial Attacks on Image Classification Models: FGSM and Patch Attacks and Their Impact. IntechOpen. https:\/\/doi.org\/10.5772\/intechopen.112442","journal-title":"IntechOpen"},{"key":"18563_CR39","doi-asserted-by":"publisher","first-page":"107309","DOI":"10.1016\/j.patcog.2020.107309","volume":"105","author":"Y Shi","year":"2020","unstructured":"Shi Y, Han Y, Zhang Q et al (2020) Adaptive iterative attack towards explainable adversarial robustness. Pattern Recognit 105:107309. https:\/\/doi.org\/10.1016\/j.patcog.2020.107309","journal-title":"Pattern Recognit"},{"issue":"28","key":"18563_CR40","doi-asserted-by":"publisher","first-page":"40511","DOI":"10.1007\/s11042-022-13172-9","volume":"81","author":"B Singh","year":"2022","unstructured":"Singh B, Sharma PK, Huddedar SA et al (2022) StegGAN: hiding image within image using conditional generative adversarial networks. Multimed Tools Appl 81(28):40511\u201340533. https:\/\/doi.org\/10.1007\/s11042-022-13172-9","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"18563_CR41","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2022","unstructured":"Tan J, Liao X, Liu J et al (2022) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888\u2013903. https:\/\/doi.org\/10.1109\/TNSE.2021.3139671","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"18563_CR42","doi-asserted-by":"publisher","unstructured":"Tan L, Huangfu T, Wu L (2021) Comparison of YOLO v3, faster R-CNN, and SSD for real-time pill identiication. https:\/\/doi.org\/10.21203\/rs.3.rs-668895\/v1","DOI":"10.21203\/rs.3.rs-668895\/v1"},{"key":"18563_CR43","doi-asserted-by":"publisher","unstructured":"Wang Y, Sun T, Li S et\u00a0al (2023) Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey. [cs.LG]. https:\/\/doi.org\/10.48550\/arXiv.2303.06302. arXiv:2303.06302","DOI":"10.48550\/arXiv.2303.06302"},{"key":"18563_CR44","doi-asserted-by":"publisher","unstructured":"Xu J, Cai Z, Shen W (2019) Using fgsm targeted attack to improve the transferability of adversarial example. In: 2019 IEEE 2nd international conference on electronics and communication engineering (ICECE), pp 20\u201325. https:\/\/doi.org\/10.1109\/ICECE48499.2019.9058535","DOI":"10.1109\/ICECE48499.2019.9058535"},{"key":"18563_CR45","doi-asserted-by":"publisher","unstructured":"Xu Z, Luo Z, Mu J (2022) Fast gradient scaled method for generating adversarial examples. ACM, pp 189\u2013193. https:\/\/doi.org\/10.1145\/3529466.3529497","DOI":"10.1145\/3529466.3529497"},{"key":"18563_CR46","doi-asserted-by":"publisher","first-page":"14363","DOI":"10.1007\/s11042-020-10310-z","volume":"80","author":"L Yan","year":"2021","unstructured":"Yan L, Fu J, Wang C et al (2021) Enhanced network optimized generative adversarial network for image enhancement. Multimed Tools Appl 80:14363\u201314381. https:\/\/doi.org\/10.1007\/s11042-020-10310-z","journal-title":"Multimed Tools Appl"},{"key":"18563_CR47","doi-asserted-by":"publisher","first-page":"7825","DOI":"10.3390\/app12157825","volume":"12","author":"L Yan","year":"2022","unstructured":"Yan L, Li K, Gao R et al (2022) An intelligent weighted object detector for feature extraction to enrich global image information. Appl Sci 12:7825. https:\/\/doi.org\/10.3390\/app12157825","journal-title":"Appl Sci"},{"key":"18563_CR48","doi-asserted-by":"publisher","unstructured":"Yang D, Xiong J, Li X et\u00a0al (2018) Building towards \u201cinvisible cloak\u201d: robust physical adversarial attack on yolo object detector. pp 368\u2013374. https:\/\/doi.org\/10.1109\/UEMCON.2018.8796670","DOI":"10.1109\/UEMCON.2018.8796670"},{"key":"18563_CR49","doi-asserted-by":"publisher","unstructured":"Zeng L, Yang N, Li X et al (2023) Advanced image steganography using a U-Net-based architecture with multi-scale fusion and perceptual loss. Electronics 12(18). https:\/\/doi.org\/10.3390\/electronics12183808. https:\/\/www.mdpi.com\/2079-9292\/12\/18\/3808","DOI":"10.3390\/electronics12183808"},{"key":"18563_CR50","unstructured":"Zhang KA, Cuesta-Infante A, Xu L et\u00a0al (2019) SteganoGAN: high capacity image steganography with GANs. arXiv:1901.03892"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18563-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18563-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18563-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T02:21:13Z","timestamp":1725330073000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18563-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,15]]},"references-count":50,"journal-issue":{"issue":"30","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["18563"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18563-8","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,2,15]]},"assertion":[{"value":"18 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}