{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:26:46Z","timestamp":1777390006442,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U19B2022"],"award-info":[{"award-number":["U19B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62272314"],"award-info":[{"award-number":["62272314"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U22B2047"],"award-info":[{"award-number":["U22B2047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62002075"],"award-info":[{"award-number":["62002075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2019B151502001"],"award-info":[{"award-number":["2019B151502001"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017622","name":"Shenzhen Research and Development Program","doi-asserted-by":"publisher","award":["JCYJ20200109105008228"],"award-info":[{"award-number":["JCYJ20200109105008228"]}],"id":[{"id":"10.13039\/501100017622","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba Group through the Alibaba Innovative Research (AIR) Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3244094","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T19:27:48Z","timestamp":1676057268000},"page":"1524-1538","source":"Crossref","is-referenced-by-count":38,"title":["ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9198-5041","authenticated-orcid":false,"given":"Xianbo","family":"Mo","sequence":"first","affiliation":[{"name":"College of Information Engineering, Shenzhen University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7457-3691","authenticated-orcid":false,"given":"Shunquan","family":"Tan","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media SecurityGuangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4082-1140","authenticated-orcid":false,"given":"Weixuan","family":"Tang","sequence":"additional","affiliation":[{"name":"Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2613-5451","authenticated-orcid":false,"given":"Bin","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Shenzhen University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Shenzhen University, Shenzhen, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"142","article-title":"A survey on image steganography and steganalysis","volume":"2","author":"Li","year":"2011","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2982624"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3111713"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2434600"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3029908"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53465-7_36"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021913"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3104140"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3148406"},{"key":"ref20","article-title":"Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism","author":"Weixuan","year":"2022","journal-title":"Sci. China Inf. Sci."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3111748"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460407"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2507159"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2682703"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041565"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2904413"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013204"},{"key":"ref32","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn. (ICML)","author":"Tan"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS49906.2020.9360897"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460395"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3005304"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3119994"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS53200.2021.9648390"},{"key":"ref39","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. 33th Int. Conf. Mach. Learn. (ICML)","author":"Mnih"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2960636"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"ref44","volume-title":"Break Our Watermarking System","author":"Bas","year":"2022"},{"key":"ref45","volume-title":"ALASKA#2 Steganalysis Challenge","year":"2022"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2175919"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10041967.pdf?arnumber=10041967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T19:22:05Z","timestamp":1709407325000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3244094","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}