{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:26Z","timestamp":1750220966845,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:00:00Z","timestamp":1568937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,20]]},"DOI":"10.1145\/3364908.3364910","type":"proceedings-article","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T13:23:09Z","timestamp":1574860989000},"page":"87-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Deceiving Steganalyzer Using Adversarial Noises"],"prefix":"10.1145","author":[{"given":"Pu","family":"Yue","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing"}]},{"given":"Tian","family":"Yuan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing"}]},{"given":"Hai","family":"Yan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing"}]}],"member":"320","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Steganography in Digital Media Principles, Algorithms, and Applications","author":"Fridrich","year":"2010","unstructured":"J. Fridrich , Steganography in Digital Media Principles, Algorithms, and Applications , Cambridge University Press , 61--70 ( 2010 ). J. Fridrich, Steganography in Digital Media Principles, Algorithms, and Applications, Cambridge University Press, 61--70 (2010)."},{"volume-title":"IEEE International Workshop on Information Forensics and Security. IEEE","author":"Holub V","key":"e_1_3_2_1_2_1","unstructured":"Holub V , Fridrich J. Designing steganographic distortion using directional filters[C ] IEEE International Workshop on Information Forensics and Security. IEEE , 2012: 234--239. Holub V, Fridrich J. Designing steganographic distortion using directional filters[C] IEEE International Workshop on Information Forensics and Security. IEEE, 2012:234--239."},{"key":"e_1_3_2_1_3_1","first-page":"4206","article-title":"A new cost function for spatial image steganography IEEE International Conference on Image Processing","volume":"2015","author":"Li B","unstructured":"Li B , Wang M , Huang J , A new cost function for spatial image steganography IEEE International Conference on Image Processing . IEEE , 2015 : 4206 -- 4210 . Li B, Wang M, Huang J, et al. A new cost function for spatial image steganography IEEE International Conference on Image Processing. IEEE, 2015:4206--4210.","journal-title":"IEEE"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. SPIE, Electronic Imaging, Media Forensics and Security XII","author":"Tomas Filler","year":"2010","unstructured":"Tomas Filler , Jan Judas, Jessica Fridrich \"Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization\" , Proc. SPIE, Electronic Imaging, Media Forensics and Security XII , San Jose, CA , January 18-20, 2010 . Tomas Filler, Jan Judas, Jessica Fridrich \"Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization\", Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 18-20, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc","author":"Holub J.","year":"2013","unstructured":"V. Holub , J. Fridrich and T. Denemark , Random Projections of Residuals as an Alternative to Co-occurrences in Steganalysis , Proc . SPIE , Electronic Imaging , Media Watermarking, Security, and Forensics XV, vol. 8665 , San Francisco, CA, February 3 -- 7, 2013 . V. Holub, J. Fridrich and T. Denemark, Random Projections of Residuals as an Alternative to Co-occurrences in Steganalysis, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, vol. 8665, San Francisco, CA, February 3 -- 7, 2013."},{"key":"e_1_3_2_1_9_1","first-page":"48","article-title":"Selection-channel-aware rich model for Steganalysis of digital images IEEE International Workshop on Information Forensics and Security","volume":"2014","author":"Denemark T","unstructured":"Denemark T , Sedighi V , Holub V , Selection-channel-aware rich model for Steganalysis of digital images IEEE International Workshop on Information Forensics and Security . IEEE , 2014 : 48 -- 53 . Denemark T, Sedighi V, Holub V, et al. Selection-channel-aware rich model for Steganalysis of digital images IEEE International Workshop on Information Forensics and Security. IEEE, 2014:48--53.","journal-title":"IEEE"},{"volume-title":"ACM","author":"Tang W","key":"e_1_3_2_1_10_1","unstructured":"Tang W , Li H , Luo W , Adaptive steganalysis against WOW embedding algorithm ACM Workshop on Information Hiding and Multimedia Security . ACM , 2014: 91--96. Tang W, Li H, Luo W, et al. Adaptive steganalysis against WOW embedding algorithm ACM Workshop on Information Hiding and Multimedia Security. ACM, 2014:91--96."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of SPIE - The International Society for Optical Engineering","author":"Qian Y","year":"2015","unstructured":"Qian Y , Dong J , Wang W. Deep learning for steganalysis via convolutional neural networks . Proceedings of SPIE - The International Society for Optical Engineering , 2015 , 9409:94090J-94090J-10. Qian Y, Dong J, Wang W. Deep learning for steganalysis via convolutional neural networks. Proceedings of SPIE - The International Society for Optical Engineering, 2015, 9409:94090J-94090J-10."},{"key":"e_1_3_2_1_12_1","first-page":"241","article-title":"Residual convolution network based steganalysis with adaptive content suppression IEEE International Conference on Multimedia and Expo","volume":"2017","author":"Wu S","unstructured":"Wu S , Zhong S , Liu Y . Residual convolution network based steganalysis with adaptive content suppression IEEE International Conference on Multimedia and Expo . IEEE , 2017 : 241 -- 246 . Wu S, Zhong S, Liu Y. Residual convolution network based steganalysis with adaptive content suppression IEEE International Conference on Multimedia and Expo. IEEE, 2017:241--246.","journal-title":"IEEE"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Deep residual learning for image steganalysis","volume":"2017","author":"Wu S","unstructured":"Wu S , Zhong S , Liu Y . Deep residual learning for image steganalysis . Multimedia Tools & Applications , 2017 : 1 -- 17 . Wu S, Zhong S, Liu Y. Deep residual learning for image steganalysis. Multimedia Tools & Applications, 2017:1--17.","journal-title":"Multimedia Tools & Applications"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Pibre L Pasquet J Ienco D etal Deep learning is a good steganalysis tool when embedding key is reused for different images even if there is a cover source mismatch Media Watermarking Security and Forensics. 2016:79--95.  Pibre L Pasquet J Ienco D et al. Deep learning is a good steganalysis tool when embedding key is reused for different images even if there is a cover source mismatch Media Watermarking Security and Forensics. 2016:79--95.","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"volume-title":"Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study ACM Workshop on Information Hiding and Multimedia Security. ACM","author":"Xu G","key":"e_1_3_2_1_16_1","unstructured":"Xu G , Wu H Z , Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study ACM Workshop on Information Hiding and Multimedia Security. ACM , 2016: 103--107. Xu G, Wu H Z, Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study ACM Workshop on Information Hiding and Multimedia Security. ACM, 2016:103--107."},{"key":"e_1_3_2_1_17_1","unstructured":"Ioffe S Szegedy C. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. 2015:448--456.  Ioffe S Szegedy C. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. 2015:448--456."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_2_1_19_1","volume-title":"Computer Science","author":"Szegedy C","year":"2013","unstructured":"Szegedy C , Zaremba W , Sutskever I , Intriguing properties of neural networks . Computer Science , 2013 . Szegedy C, Zaremba W, Sutskever I, et al. Intriguing properties of neural networks. Computer Science, 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods[J]","author":"Carlini N","year":"2017","unstructured":"Carlini N , Wagner D. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods[J] . 2017 . Carlini N, Wagner D. Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods[J]. 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"On the (Statistical) Detection of Adversarial Examples[J]","author":"Grosse K","year":"2017","unstructured":"Grosse K , Manoharan P , Papernot N , On the (Statistical) Detection of Adversarial Examples[J] . 2017 . Grosse K, Manoharan P, Papernot N, et al. On the (Statistical) Detection of Adversarial Examples[J]. 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"Computer Science","author":"Goodfellow I J","year":"2014","unstructured":"Goodfellow I J , Shlens J , Szegedy C. Explaining and Harnessing Adversarial Examples . Computer Science , 2014 . Goodfellow I J, Shlens J, Szegedy C. Explaining and Harnessing Adversarial Examples. Computer Science, 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eurtel.2017.06.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Jia Yangqing Shelhamer et al. Caffe: Convolutional Architecture for Fast Feature Embedding[J]. 2014:675--678  Jia Yangqing Shelhamer et al. Caffe: Convolutional Architecture for Fast Feature Embedding[J]. 2014:675--678","DOI":"10.1145\/2647868.2654889"}],"event":{"name":"SSPS 2019: 2019 International Symposium on Signal Processing Systems","sponsor":["Beijing University of Posts and Telecommunications"],"location":"Beijing China","acronym":"SSPS 2019"},"container-title":["Proceedings of the 2019 International Symposium on Signal Processing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364908.3364910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364908.3364910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:23Z","timestamp":1750204463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364908.3364910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,20]]},"references-count":24,"alternative-id":["10.1145\/3364908.3364910","10.1145\/3364908"],"URL":"https:\/\/doi.org\/10.1145\/3364908.3364910","relation":{},"subject":[],"published":{"date-parts":[[2019,9,20]]},"assertion":[{"value":"2019-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}