{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T06:20:57Z","timestamp":1778739657129,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing Municipal Commission of Science and Technology","award":["Grant 181100008918005"],"award-info":[{"award-number":["Grant 181100008918005"]}]},{"name":"Peking University","award":["Start-up Grant"],"award-info":[{"award-number":["Start-up Grant"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["Grant 61772037"],"award-info":[{"award-number":["Grant 61772037"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,5]]},"DOI":"10.1145\/3323873.3325011","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T12:10:58Z","timestamp":1560168658000},"page":"87-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":135,"title":["High-Capacity Convolutional Video Steganography with Temporal Residual Modeling"],"prefix":"10.1145","author":[{"given":"Xinyu","family":"Weng","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yongzhi","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Lu","family":"Chi","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yadong","family":"Mu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2010.14"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.668971"},{"key":"e_1_3_2_1_3_1","unstructured":"Shumeet Baluja. 2017. Hiding Images in Plain Sight: Deep Steganography. In NIPS.   Shumeet Baluja. 2017. Hiding Images in Plain Sight: Deep Steganography. In NIPS."},{"key":"e_1_3_2_1_4_1","unstructured":"J. J. Chae and B. S. Manjunath. 1999. Data hiding in video. In ICIP.  J. J. Chae and B. S. Manjunath. 1999. Data hiding in video. In ICIP."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958299"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"e_1_3_2_1_7_1","volume-title":"Yuille","author":"Chen Liang-Chieh","year":"2016","unstructured":"Liang-Chieh Chen , George Papandreou , Iasonas Kokkinos , Kevin Murphy , and Alan L . Yuille . 2016 . DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs. CoRR abs\/1606.00915 (2016). Liang-Chieh Chen, George Papandreou, Iasonas Kokkinos, Kevin Murphy, and Alan L. Yuille. 2016. DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs. CoRR abs\/1606.00915 (2016)."},{"key":"e_1_3_2_1_8_1","first-page":"275","article-title":"A DWT based approach for image steganography","volume":"4","author":"Chen Po-Yueh","year":"2006","unstructured":"Po-Yueh Chen , Hung-Ju Lin , 2006 . A DWT based approach for image steganography . International Journal of Applied Science and Engineering 4 , 3 (2006), 275 -- 290 . Po-Yueh Chen, Hung-Ju Lin, et al. 2006. A DWT based approach for image steganography. International Journal of Applied Science and Engineering 4, 3 (2006), 275--290.","journal-title":"International Journal of Applied Science and Engineering"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.09.001"},{"key":"e_1_3_2_1_10_1","volume-title":"Bilal Bahaa, and A Zaidan.","author":"Eltahir Mohamed Elsadig","year":"2009","unstructured":"Mohamed Elsadig Eltahir , Miss Laiha Mat Kiah , Bilal Bahaa, and A Zaidan. 2009 . High Rate Video Streaming Steganography. In ICIME. Mohamed Elsadig Eltahir, Miss Laiha Mat Kiah, Bilal Bahaa, and A Zaidan. 2009. High Rate Video Streaming Steganography. In ICIME."},{"key":"e_1_3_2_1_11_1","volume-title":"Adversarial Examples that Fool both Human and Computer Vision. CoRR abs\/1802.08195","author":"Elsayed Gamaleldin F.","year":"2018","unstructured":"Gamaleldin F. Elsayed , Shreya Shankar , Brian Cheung , Nicolas Papernot , Alex Kurakin , Ian J. Goodfellow , and Jascha Sohl-Dickstein . 2018. Adversarial Examples that Fool both Human and Computer Vision. CoRR abs\/1802.08195 ( 2018 ). Gamaleldin F. Elsayed, Shreya Shankar, Brian Cheung, Nicolas Papernot, Alex Kurakin, Ian J. Goodfellow, and Jascha Sohl-Dickstein. 2018. Adversarial Examples that Fool both Human and Computer Vision. CoRR abs\/1802.08195 (2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jessica Fridrich and Miroslav Goljan. 2002. Practical Steganalysis of Digital Images - State of the Art. (2002).  Jessica Fridrich and Miroslav Goljan. 2002. Practical Steganalysis of Digital Images - State of the Art. (2002).","DOI":"10.1117\/12.465263"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.479739"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_2_1_16_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In NIPS.   Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative Adversarial Nets. In NIPS."},{"key":"e_1_3_2_1_17_1","unstructured":"Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In NIPS.   Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In NIPS."},{"key":"e_1_3_2_1_18_1","volume-title":"Fridrich","author":"Holub Vojtech","year":"2012","unstructured":"Vojtech Holub and Jessica J . Fridrich . 2012 . Designing steganographic distortion using directional filters. In WIFS. Vojtech Holub and Jessica J. Fridrich. 2012. Designing steganographic distortion using directional filters. In WIFS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-014-1702-1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-8"},{"key":"e_1_3_2_1_22_1","volume-title":"Efros","author":"Isola Phillip","year":"2017","unstructured":"Phillip Isola , Jun-Yan Zhu , Tinghui Zhou , and Alexei A . Efros . 2017 . Image-to-Image Translation with Conditional Adversarial Networks. In CVPR. Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Image-to-Image Translation with Conditional Adversarial Networks. In CVPR."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2462810"},{"key":"e_1_3_2_1_24_1","volume-title":"Exploring steganography: Seeing the unseen. Computer 31, 2","author":"Johnson Neil F","year":"1998","unstructured":"Neil F Johnson and Sushil Jajodia . 1998. Exploring steganography: Seeing the unseen. Computer 31, 2 ( 1998 ). Neil F Johnson and Sushil Jajodia. 1998. Exploring steganography: Seeing the unseen. Computer 31, 2 (1998)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechn.2011.6164800"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.465313"},{"key":"e_1_3_2_1_27_1","first-page":"72","article-title":"Steganographic approach for hiding image in DCT domain","volume":"1","author":"Kaur Blossom","year":"2011","unstructured":"Blossom Kaur , Amandeep Kaur , and Jasdeep Singh . 2011 . Steganographic approach for hiding image in DCT domain . International Journal of Advances in Engineering & Technology 1 , 3 (2011), 72 . Blossom Kaur, Amandeep Kaur, and Jasdeep Singh. 2011. Steganographic approach for hiding image in DCT domain. International Journal of Advances in Engineering & Technology 1, 3 (2011), 72.","journal-title":"International Journal of Advances in Engineering & Technology"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.337436"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-385510-7.00002-3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.12.013"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7682098"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041812"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"e_1_3_2_1_35_1","volume-title":"Olivier","author":"Morkel T.","year":"2005","unstructured":"T. Morkel , Jan H. P. Eloff , and Martin S . Olivier . 2005 . An overview of image steganography. In ISSA. T. Morkel, Jan H. P. Eloff, and Martin S. Olivier. 2005. An overview of image steganography. In ISSA."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.029"},{"key":"e_1_3_2_1_37_1","volume-title":"A novel technique for image steganography based on Block-DCT and Huffman Encoding. arXiv preprint arXiv:1006.1186","author":"Nag Amitava","year":"2010","unstructured":"Amitava Nag , Sushanta Biswas , Debasree Sarkar , and Partha Pratim Sarkar . 2010. A novel technique for image steganography based on Block-DCT and Huffman Encoding. arXiv preprint arXiv:1006.1186 ( 2010 ). Amitava Nag, Sushanta Biswas, Debasree Sarkar, and Partha Pratim Sarkar. 2010. A novel technique for image steganography based on Block-DCT and Huffman Encoding. arXiv preprint arXiv:1006.1186 (2010)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.105"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Tom\u00e1s Pevny Tom\u00e1s Filler and Patrick Bas. 2010. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In Information Hiding.   Tom\u00e1s Pevny Tom\u00e1s Filler and Patrick Bas. 2010. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In Information Hiding.","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"e_1_3_2_1_40_1","volume-title":"Deep Learning for steganalysis is better than a Rich Model with an Ensemble Classifier, and is natively robust to the cover source-mismatch. CoRR abs\/1511.04855","author":"Pibre Lionel","year":"2015","unstructured":"Lionel Pibre , J\u00e9r\u00f4me Pasquet , Dino Ienco , and Marc Chaumont . 2015. Deep Learning for steganalysis is better than a Rich Model with an Ensemble Classifier, and is natively robust to the cover source-mismatch. CoRR abs\/1511.04855 ( 2015 ). Lionel Pibre, J\u00e9r\u00f4me Pasquet, Dino Ienco, and Marc Chaumont. 2015. Deep Learning for steganalysis is better than a Rich Model with an Ensemble Classifier, and is natively robust to the cover source-mismatch. CoRR abs\/1511.04855 (2015)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Lionel Pibre J\u00e9r\u00f4me Pasquet Dino Ienco and Marc Chaumont. 2016. Deep learning is a good steganalysis tool when embedding key is reused for different images even if there is a cover sourcemismatch. In MediaWatermarking Security and Forensics. 1--11.  Lionel Pibre J\u00e9r\u00f4me Pasquet Dino Ienco and Marc Chaumont. 2016. Deep learning is a good steganalysis tool when embedding key is reused for different images even if there is a cover sourcemismatch. In MediaWatermarking Security and Forensics. 1--11.","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"e_1_3_2_1_42_1","volume-title":"An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods. CoRR abs\/1709.06727","author":"Qazanfari Kazem","year":"2017","unstructured":"Kazem Qazanfari and Reza Safabakhsh . 2017. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods. CoRR abs\/1709.06727 ( 2017 ). Kazem Qazanfari and Reza Safabakhsh. 2017. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods. CoRR abs\/1709.06727 (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Yinlong Qian Jing Dong Wei Wang and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking Security and Forensics.  Yinlong Qian Jing Dong Wei Wang and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking Security and Forensics.","DOI":"10.1117\/12.2083479"},{"key":"e_1_3_2_1_44_1","first-page":"293","article-title":"Steganography using BPCS to the integer wavelet transformed image","volume":"7","author":"Ramani GMK","year":"2007","unstructured":"GMK Ramani , EV Prasad , S Varadarajan , Tirupati SVUCE, and Kakinada JNTUCE. 2007 . Steganography using BPCS to the integer wavelet transformed image . IJCSNS 7 , 7 (2007), 293 -- 302 . GMK Ramani, EV Prasad, S Varadarajan, Tirupati SVUCE, and Kakinada JNTUCE. 2007. Steganography using BPCS to the integer wavelet transformed image. IJCSNS 7, 7 (2007), 293--302.","journal-title":"IJCSNS"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1952-z"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859378"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00122-8"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4847098"},{"key":"e_1_3_2_1_49_1","volume-title":"Hiding an image inside another image using variable-rate steganography. IJACSA 4, 10","author":"Tamimi Abdelfatah A","year":"2013","unstructured":"Abdelfatah A Tamimi , Ayman M Abdalla , and Omaima Al-Allaf . 2013. Hiding an image inside another image using variable-rate steganography. IJACSA 4, 10 ( 2013 ). Abdelfatah A Tamimi, Ayman M Abdalla, and Omaima Al-Allaf. 2013. Hiding an image inside another image using variable-rate steganography. IJACSA 4, 10 (2013)."},{"key":"e_1_3_2_1_50_1","unstructured":"Shunquan Tan and Bin Li. 2014. Stacked convolutional auto-encoders for steganalysis of digital images. In APSIPA.  Shunquan Tan and Bin Li. 2014. Stacked convolutional auto-encoders for steganalysis of digital images. In APSIPA."},{"key":"e_1_3_2_1_51_1","volume-title":"C3D: Generic Features for Video Analysis. CoRR abs\/1412.0767","author":"Tran Du","year":"2014","unstructured":"Du Tran , Lubomir D. Bourdev , Rob Fergus , Lorenzo Torresani , and Manohar Paluri . 2014. C3D: Generic Features for Video Analysis. CoRR abs\/1412.0767 ( 2014 ). Du Tran, Lubomir D. Bourdev, Rob Fergus, Lorenzo Torresani, and Manohar Paluri. 2014. C3D: Generic Features for Video Analysis. CoRR abs\/1412.0767 (2014)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2018010104"},{"key":"e_1_3_2_1_54_1","volume-title":"HiDDeN: Hiding Data With Deep Networks. arXiv preprint arXiv:1807.09937","author":"Zhu Jiren","year":"2018","unstructured":"Jiren Zhu , Russell Kaplan , Justin Johnson , and Li Fei-Fei . 2018. HiDDeN: Hiding Data With Deep Networks. arXiv preprint arXiv:1807.09937 ( 2018 ). Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. HiDDeN: Hiding Data With Deep Networks. arXiv preprint arXiv:1807.09937 (2018)."}],"event":{"name":"ICMR '19: International Conference on Multimedia Retrieval","location":"Ottawa ON Canada","acronym":"ICMR '19","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2019 on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323873.3325011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:22Z","timestamp":1750208542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":54,"alternative-id":["10.1145\/3323873.3325011","10.1145\/3323873"],"URL":"https:\/\/doi.org\/10.1145\/3323873.3325011","relation":{},"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}