{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:17Z","timestamp":1773511217704,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61772571"],"award-info":[{"award-number":["61772571"]}]},{"name":"National Natural Science Foundation of China","award":["U1536204"],"award-info":[{"award-number":["U1536204"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3335203.3335713","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"37-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Towards Automatic Embedding Cost Learning for JPEG Steganography"],"prefix":"10.1145","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Danyang","family":"Ruan","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Xiangui","family":"Kang","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International workshop on information hiding","author":"Bas P."},{"key":"e_1_3_2_1_2_1","unstructured":"P. Bas and T. Furon. 2007. BOWS-2. http:\/\/bows2.ec-lille.fr  P. Bas and T. Furon. 2007. BOWS-2. http:\/\/bows2.ec-lille.fr"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083248"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX","volume":"6505","author":"Fridrich J."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems 27","author":"Goodfellow I."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312817"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)","author":"He K."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS)","author":"Holub V."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR)","author":"Huang G."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"e_1_3_2_1_17_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma D.","year":"2014"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP)","author":"Li B."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Workshop on Information Hiding, Rainer B\u00f6hme, Philip W. L. Fong, and Reihaneh Safavi-Naini (Eds.)","author":"Pevn\u00fd T."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Medical Image Computing and Computer-Assisted Intervention (MICCAI)","author":"Ronneberger O."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756608"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083236"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6878-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"J. Yang D. Ruan J. Huang X. Kang and Y. Shi. 2019. An Embedding Cost Learning Framework Using GAN. IEEE Transactions on Information Forensics and Security (2019) Under review.  J. Yang D. Ruan J. Huang X. Kang and Y. Shi. 2019. An Embedding Cost Learning Framework Using GAN. IEEE Transactions on Information Forensics and Security (2019) Under review.","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779446"}],"event":{"name":"IH&MMSec '19: ACM Information Hiding and Multimedia Security Workshop","location":"Paris France","acronym":"IH&MMSec '19","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335203.3335713","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3335203.3335713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:01Z","timestamp":1750203901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335203.3335713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":27,"alternative-id":["10.1145\/3335203.3335713","10.1145\/3335203"],"URL":"https:\/\/doi.org\/10.1145\/3335203.3335713","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}