{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:39Z","timestamp":1750220079597,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100018818","name":"National Research, Development and Innovation Office","doi-asserted-by":"publisher","award":["TKP2021-NVA-09 and MILAB"],"award-info":[{"award-number":["TKP2021-NVA-09 and MILAB"]}],"id":[{"id":"10.13039\/501100018818","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3531536.3532966","type":"proceedings-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T22:18:44Z","timestamp":1656022724000},"page":"51-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification"],"prefix":"10.1145","author":[{"given":"\u00c1rp\u00e1d","family":"Berta","sequence":"first","affiliation":[{"name":"University of Szeged, Szeged, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G\u00e1bor","family":"Danner","sequence":"additional","affiliation":[{"name":"University of Szeged, Szeged, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Istv\u00e1n","family":"Hegedus","sequence":"additional","affiliation":[{"name":"University of Szeged, Szeged, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Jelasity","sequence":"additional","affiliation":[{"name":"University of Szeged &amp; ELKH SZTE Research Group on Artificial Intelligence, Szeged, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Square Attack: a query-efficient black-box adversarial attack via random search. CoRR abs\/1912.00049","author":"Andriushchenko Maksym","year":"2019","unstructured":"Maksym Andriushchenko , Francesco Croce , Nicolas Flammarion , and Matthias Hein . 2019. Square Attack: a query-efficient black-box adversarial attack via random search. CoRR abs\/1912.00049 ( 2019 ). arXiv:1912.00049 http:\/\/arxiv.org\/abs\/1912.00049 Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, and Matthias Hein. 2019. Square Attack: a query-efficient black-box adversarial attack via random search. CoRR abs\/1912.00049 (2019). arXiv:1912.00049 http:\/\/arxiv.org\/abs\/1912.00049"},{"key":"e_1_3_2_1_2_1","volume-title":"Garnett (Eds.)","volume":"30","author":"Baluja Shumeet","year":"2017","unstructured":"Shumeet Baluja . 2017 . Hiding Images in Plain Sight: Deep Steganography. In Advances in Neural Information Processing Systems, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R . Garnett (Eds.) , Vol. 30 . Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/ 2017\/file\/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf Shumeet Baluja. 2017. Hiding Images in Plain Sight: Deep Steganography. In Advances in Neural Information Processing Systems, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/2017\/file\/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Branch and Bound for Piecewise Linear Neural Network Verification","volume":"21","author":"Bunel Rudy","year":"2020","unstructured":"Rudy Bunel , Jingyue Lu , Ilker Turkaslan , Philip H. S. Torr , Pushmeet Kohli , and M. Pawan Kumar . 2020 . Branch and Bound for Piecewise Linear Neural Network Verification . Journal of Machine Learning Research 21 , 42 (2020), 1 -- 39 . http:\/\/jmlr.org\/papers\/v21\/19--468.html Rudy Bunel, Jingyue Lu, Ilker Turkaslan, Philip H. S. Torr, Pushmeet Kohli, and M. Pawan Kumar. 2020. Branch and Bound for Piecewise Linear Neural Network Verification. Journal of Machine Learning Research 21, 42 (2020), 1--39. http:\/\/jmlr.org\/papers\/v21\/19--468.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_4_1","volume-title":"RobustBench: a standardized adversarial robustness benchmark. CoRR abs\/2010.09670","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce , Maksym Andriushchenko , Vikash Sehwag , Nicolas Flammarion , Mung Chiang , Prateek Mittal , and Matthias Hein . 2020. RobustBench: a standardized adversarial robustness benchmark. CoRR abs\/2010.09670 ( 2020 ). arXiv:2010.09670 https:\/\/arxiv.org\/abs\/2010.09670 Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Nicolas Flammarion, Mung Chiang, Prateek Mittal, and Matthias Hein. 2020. RobustBench: a standardized adversarial robustness benchmark. CoRR abs\/2010.09670 (2020). arXiv:2010.09670 https:\/\/arxiv.org\/abs\/2010.09670"},{"key":"e_1_3_2_1_5_1","volume-title":"Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack. CoRR abs\/1907.02044","author":"Croce Francesco","year":"2019","unstructured":"Francesco Croce and Matthias Hein . 2019. Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack. CoRR abs\/1907.02044 ( 2019 ). arXiv:1907.02044 http:\/\/arxiv.org\/abs\/1907.02044 Francesco Croce and Matthias Hein. 2019. Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack. CoRR abs\/1907.02044 (2019). arXiv:1907.02044 http:\/\/arxiv.org\/abs\/1907.02044"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18","author":"Croce Francesco","year":"2020","unstructured":"Francesco Croce and Matthias Hein . 2020 . Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks . In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event. PMLR, 2206--2216. Francesco Croce and Matthias Hein. 2020. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks. In Proceedings of the 37th International Conference on Machine Learning, ICML 2020, 13--18 July 2020, Virtual Event. PMLR, 2206--2216."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_8_1","volume-title":"Dan Andrei Calian, and Timothy A Mann","author":"Gowal Sven","year":"2021","unstructured":"Sven Gowal , Sylvestre-Alvise Rebuffi , Olivia Wiles , Florian Stimberg , Dan Andrei Calian, and Timothy A Mann . 2021 . Improving Robustness using Generated Data. Advances in Neural Information Processing Systems 34 (2021). Sven Gowal, Sylvestre-Alvise Rebuffi, Olivia Wiles, Florian Stimberg, Dan Andrei Calian, and Timothy A Mann. 2021. Improving Robustness using Generated Data. Advances in Neural Information Processing Systems 34 (2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_10_1","volume-title":"Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531","author":"Hinton Geoffrey E.","year":"2015","unstructured":"Geoffrey E. Hinton , Oriol Vinyals , and Jeffrey Dean . 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531 ( 2015 ). arXiv:1503.02531 http:\/\/arxiv.org\/abs\/1503.02531 Geoffrey E. Hinton, Oriol Vinyals, and Jeffrey Dean. 2015. Distilling the Knowledge in a Neural Network. CoRR abs\/1503.02531 (2015). arXiv:1503.02531 http:\/\/arxiv.org\/abs\/1503.02531"},{"key":"e_1_3_2_1_11_1","volume-title":"Kochenderfer","author":"Katz Guy","year":"2017","unstructured":"Guy Katz , Clark Barrett , David L. Dill , Kyle Julian , and Mykel J . Kochenderfer . 2017 . Reluplex : An Efficient SMT Solver for Verifying Deep Neural Networks. In Computer Aided Verification, Rupak Majumdar and Viktor Kuncak (Eds.). Springer International Publishing , Cham, 97--117. https:\/\/doi.org\/10.1007\/978--3--319--63387--9_5 10.1007\/978--3--319--63387--9_5 Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, and Mykel J. Kochenderfer. 2017. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. In Computer Aided Verification, Rupak Majumdar and Viktor Kuncak (Eds.). Springer International Publishing, Cham, 97--117. https:\/\/doi.org\/10.1007\/978--3--319--63387--9_5"},{"key":"e_1_3_2_1_12_1","volume-title":"TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning. In 2020 57th ACM\/IEEE Design Automation Conference (DAC). 1--6. https:\/\/doi.org\/10","author":"Kiourti Panagiota","year":"2020","unstructured":"Panagiota Kiourti , Kacper Wardega , Susmit Jha , and Wenchao Li . 2020 . TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning. In 2020 57th ACM\/IEEE Design Automation Conference (DAC). 1--6. https:\/\/doi.org\/10 .1109\/DAC18072.2020.9218663 10.1109\/DAC18072.2020.9218663 Panagiota Kiourti, Kacper Wardega, Susmit Jha, and Wenchao Li. 2020. TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning. In 2020 57th ACM\/IEEE Design Automation Conference (DAC). 1--6. https:\/\/doi.org\/10.1109\/DAC18072.2020.9218663"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3021407"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01615"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"Adversarial Learning Targeting Deep Neural Network Classification","volume":"108","author":"Miller David J.","year":"2020","unstructured":"David J. Miller , Zhen Xiang , and George Kesidis . 2020 . Adversarial Learning Targeting Deep Neural Network Classification : A Comprehensive Review of Defenses Against Attacks. Proc. IEEE 108 , 3 (March 2020), 402--433. https:\/\/doi.org\/10.1109\/JPROC.2020.2970615 10.1109\/JPROC.2020.2970615 David J. Miller, Zhen Xiang, and George Kesidis. 2020. Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks. Proc. IEEE 108, 3 (March 2020), 402--433. https:\/\/doi.org\/10.1109\/JPROC.2020.2970615","journal-title":"A Comprehensive Review of Defenses Against Attacks. Proc. IEEE"},{"key":"e_1_3_2_1_17_1","volume-title":"Robustness Trade-off. In ICML 2021 Workshop on Adversarial Machine Learning. https:\/\/openreview.net\/forum?id=BuD2LmNaU3a","author":"Rade Rahul","year":"2021","unstructured":"Rahul Rade and Seyed-Mohsen Moosavi-Dezfooli . 2021 . Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs . Robustness Trade-off. In ICML 2021 Workshop on Adversarial Machine Learning. https:\/\/openreview.net\/forum?id=BuD2LmNaU3a Rahul Rade and Seyed-Mohsen Moosavi-Dezfooli. 2021. Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off. In ICML 2021 Workshop on Adversarial Machine Learning. https:\/\/openreview.net\/forum?id=BuD2LmNaU3a"},{"key":"e_1_3_2_1_18_1","volume-title":"Mann","author":"Rebuffi Sylvestre-Alvise","year":"2021","unstructured":"Sylvestre-Alvise Rebuffi , Sven Gowal , Dan A. Calian , Florian Stimberg , Olivia Wiles , and Timothy A . Mann . 2021 . Fixing Data Augmentation to Improve Adversarial Robustness. CoRR abs\/2103.01946 (2021). arXiv:2103.01946 https:\/\/arxiv.org\/abs\/2103.01946 Sylvestre-Alvise Rebuffi, Sven Gowal, Dan A. Calian, Florian Stimberg, Olivia Wiles, and Timothy A. Mann. 2021. Fixing Data Augmentation to Improve Adversarial Robustness. CoRR abs\/2103.01946 (2021). arXiv:2103.01946 https:\/\/arxiv.org\/abs\/2103.01946"},{"key":"e_1_3_2_1_19_1","unstructured":"Hadi Salman Andrew Ilyas Logan Engstrom Ashish Kapoor and Aleksander Madry. 2020. Do Adversarially Robust ImageNet Models Transfer Better?. In ArXiv preprint arXiv:2007.08489.  Hadi Salman Andrew Ilyas Logan Engstrom Ashish Kapoor and Aleksander Madry. 2020. Do Adversarially Robust ImageNet Models Transfer Better?. In ArXiv preprint arXiv:2007.08489."},{"key":"e_1_3_2_1_20_1","volume-title":"On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. In IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security","author":"Shafieinejad Masoumeh","year":"2021","unstructured":"Masoumeh Shafieinejad , Nils Lukas , Jiaqi Wang , Xinda Li , and Florian Kerschbaum . 2021 . On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. In IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security , Virtual Event, Belgium, June, 22--25 , 2021, Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tom\u00e1s Pevn\u00fd, Bin Li, and Jennifer Newman (Eds.). ACM, 177--188. https:\/\/doi.org\/10.1145\/3437880.3460401 10.1145\/3437880.3460401 Masoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, Xinda Li, and Florian Kerschbaum. 2021. On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. In IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22--25, 2021, Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tom\u00e1s Pevn\u00fd, Bin Li, and Jennifer Newman (Eds.). ACM, 177--188. https:\/\/doi.org\/10.1145\/3437880.3460401"},{"key":"e_1_3_2_1_21_1","volume-title":"NIPS 2017 Workshop on Machine Learning and Computer Security","volume":"1","author":"Shin Richard","year":"2017","unstructured":"Richard Shin and Dawn Song . 2017 . JPEG-resistant adversarial images . In NIPS 2017 Workshop on Machine Learning and Computer Security , Vol. 1 . Richard Shin and Dawn Song. 2017. JPEG-resistant adversarial images. In NIPS 2017 Workshop on Machine Learning and Computer Security, Vol. 1."},{"key":"e_1_3_2_1_22_1","volume-title":"2nd International Conference on Learning Representations (ICLR). http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In 2nd International Conference on Learning Representations (ICLR). http:\/\/arxiv.org\/abs\/1312 .6199 Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations (ICLR). http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403064"},{"key":"e_1_3_2_1_24_1","volume-title":"Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In 2019 IEEE Symposium on Security and Privacy (SP). 707--723","author":"Wang Bolun","year":"2019","unstructured":"Bolun Wang , Yuanshun Yao , Shawn Shan , Huiying Li , Bimal Viswanath , Haitao Zheng , and Ben Y. Zhao . 2019 . Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In 2019 IEEE Symposium on Security and Privacy (SP). 707--723 . https:\/\/doi.org\/10.1109\/SP. 2019 .00031 10.1109\/SP.2019.00031 Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, and Ben Y. Zhao. 2019. Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. In 2019 IEEE Symposium on Security and Privacy (SP). 707--723. https:\/\/doi.org\/10.1109\/SP.2019.00031"},{"key":"e_1_3_2_1_25_1","volume-title":"On the trade-off between adversarial and backdoor robustness. Advances in Neural Information Processing Systems 33","author":"Weng Cheng-Hsin","year":"2020","unstructured":"Cheng-Hsin Weng , Yan-Ting Lee , and Shan-Hung Brandon Wu . 2020. On the trade-off between adversarial and backdoor robustness. Advances in Neural Information Processing Systems 33 ( 2020 ). Cheng-Hsin Weng, Yan-Ting Lee, and Shan-Hung Brandon Wu. 2020. On the trade-off between adversarial and backdoor robustness. Advances in Neural Information Processing Systems 33 (2020)."},{"key":"e_1_3_2_1_26_1","volume-title":"Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI","author":"Zhang Chaoning","year":"2021","unstructured":"Chaoning Zhang , Philipp Benz , Adil Karjauv , and In So Kweon . 2021. Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards a Fourier Perspective . In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021 , Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2--9, 2021. AAAI Press , 3296--3304. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/16441 Chaoning Zhang, Philipp Benz, Adil Karjauv, and In So Kweon. 2021. Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards a Fourier Perspective. In Thirty-Fifth AAAI Conference on Artificial Intelligence, AAAI 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, IAAI 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, EAAI 2021, Virtual Event, February 2--9, 2021. AAAI Press, 3296--3304. https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/16441"},{"key":"e_1_3_2_1_27_1","volume-title":"Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking. In MM '21: ACM Multimedia Conference","author":"Zhang Chaoning","year":"2021","unstructured":"Chaoning Zhang , Adil Karjauv , Philipp Benz , and In So Kweon . 2021 . Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking. In MM '21: ACM Multimedia Conference , Virtual Event, China, October 20 - 24 , 2021, Heng Tao Shen, Yueting Zhuang, John R. Smith, Yang Yang, Pablo Cesar, Florian Metze, and Balakrishnan Prabhakaran (Eds.). ACM, 5158--5166. https:\/\/doi.org\/10.1145\/3474085.3475628 10.1145\/3474085.3475628 Chaoning Zhang, Adil Karjauv, Philipp Benz, and In So Kweon. 2021. Towards Robust Deep Hiding Under Non-Differentiable Distortions for Practical Blind Watermarking. In MM '21: ACM Multimedia Conference, Virtual Event, China, October 20 - 24, 2021, Heng Tao Shen, Yueting Zhuang, John R. Smith, Yang Yang, Pablo Cesar, Florian Metze, and Balakrishnan Prabhakaran (Eds.). ACM, 5158--5166. https:\/\/doi.org\/10.1145\/3474085.3475628"},{"key":"e_1_3_2_1_28_1","volume-title":"A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs\/2103.01607","author":"Zhang Chaoning","year":"2021","unstructured":"Chaoning Zhang , Chenguo Lin , Philipp Benz , Kejiang Chen , Weiming Zhang , and In So Kweon . 2021. A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs\/2103.01607 ( 2021 ). https:\/\/arxiv.org\/abs\/2103.01607 Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, and In So Kweon. 2021. A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking. CoRR abs\/2103.01607 (2021). https:\/\/arxiv.org\/abs\/2103.01607"},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Learning Representations (ICLR). https:\/\/openreview.net\/forum?id=4IwieFS44l","author":"Zombori D\u00e1niel","year":"2021","unstructured":"D\u00e1niel Zombori , Bal\u00e1zs B\u00e1nhelyi , Tibor Csendes , Istv\u00e1n Megyeri , and M\u00e1rk Jelasity . 2021 . Fooling a Complete Neural Network Verifier . In International Conference on Learning Representations (ICLR). https:\/\/openreview.net\/forum?id=4IwieFS44l D\u00e1niel Zombori, Bal\u00e1zs B\u00e1nhelyi, Tibor Csendes, Istv\u00e1n Megyeri, and M\u00e1rk Jelasity. 2021. Fooling a Complete Neural Network Verifier. In International Conference on Learning Representations (ICLR). https:\/\/openreview.net\/forum?id=4IwieFS44l"}],"event":{"name":"IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Santa Barbara CA USA","acronym":"IH&MMSec '22"},"container-title":["Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531536.3532966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531536.3532966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:22Z","timestamp":1750183762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531536.3532966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":28,"alternative-id":["10.1145\/3531536.3532966","10.1145\/3531536"],"URL":"https:\/\/doi.org\/10.1145\/3531536.3532966","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"2022-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}