{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T04:28:59Z","timestamp":1772080139033,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2047, 62102386, 62072421, 62002334, 62121002."],"award-info":[{"award-number":["U20B2047, 62102386, 62072421, 62002334, 62121002."]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612076","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:27:12Z","timestamp":1698391632000},"page":"7424-7434","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["ProTegO: Protect Text Content against OCR Extraction Attack"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9546-5043","authenticated-orcid":false,"given":"Yanru","family":"He","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9868-3414","authenticated-orcid":false,"given":"Kejiang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0651-6617","authenticated-orcid":false,"given":"Guoqiang","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8153-341X","authenticated-orcid":false,"given":"Zehua","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1424-2353","authenticated-orcid":false,"given":"Kui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4230-1077","authenticated-orcid":false,"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9686-4829","authenticated-orcid":false,"given":"Huanyu","family":"Bian","sequence":"additional","affiliation":[{"name":"Aerospace Information Research Institute, Chinese Academy of Sciences, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9635-9859","authenticated-orcid":false,"given":"Han","family":"Fang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5576-6108","authenticated-orcid":false,"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4417-9316","authenticated-orcid":false,"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00481"},{"key":"e_1_3_2_2_2_1","unstructured":"Belval. 2020. TextRecognitionDataGenerator. https:\/\/github.com\/Belval\/ TextRecognitionDataGenerator."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219861"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833641"},{"key":"e_1_3_2_2_5_1","first-page":"120","article-title":"The openCV library","volume":"25","author":"Bradski Gary","year":"2000","unstructured":"Gary Bradski. 2000. The openCV library. Dr. Dobb's Journal: Software Tools for the Professional Programmer 25, 11 (2000), 120--123.","journal-title":"Dr. Dobb's Journal: Software Tools for the Professional Programmer"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp). Ieee 39--57.","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_7_1","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 547--563","author":"Chen Lu","year":"2020","unstructured":"Lu Chen, Jiao Sun, and Wei Xu. 2020. FAWA: fast adversarial watermark attack on optical character recognition (OCR) systems. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 547--563."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3440756"},{"key":"e_1_3_2_2_9_1","volume-title":"NIPS workshop.","author":"Collobert Ronan","year":"2011","unstructured":"Ronan Collobert, Koray Kavukcuoglu, and Cl\u00e9ment Farabet. 2011. Torch7: A matlab-like environment for machine learning. In BigLearn, NIPS workshop."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737627"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3061801"},{"key":"e_1_3_2_2_12_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31522-0_91"},{"key":"e_1_3_2_2_15_1","volume-title":"Image-to- Image Translation with Conditional Adversarial Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Isola Phillip","year":"2017","unstructured":"Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Image-to- Image Translation with Conditional Adversarial Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017), 5967--5976."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"e_1_3_2_2_17_1","article-title":"Investigation of reading background colour based on visual fatigue. In Applied Mechanics and Materials, Vol. 295","author":"Li Zhi Jian","year":"2013","unstructured":"Zhi Jian Li and Nuo Li. 2013. Investigation of reading background colour based on visual fatigue. In Applied Mechanics and Materials, Vol. 295. Trans Tech Publ, 536--538.","journal-title":"Trans Tech Publ, 536--538."},{"key":"e_1_3_2_2_18_1","volume-title":"Real-Time Scene Text Detection with Differentiable Binarization and Adaptive Scale Fusion","author":"Liao Minghui","year":"2022","unstructured":"Minghui Liao, Zhisheng Zou, Zhaoyi Wan, Cong Yao, and Xiang Bai. 2022. Real-Time Scene Text Detection with Differentiable Binarization and Adaptive Scale Fusion. IEEE transactions on pattern analysis and machine intelligence PP (2022)."},{"key":"e_1_3_2_2_19_1","volume-title":"Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In International Conference on Learning Representations.","author":"Lin Jiadong","year":"2019","unstructured":"Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, and John E Hopcroft. 2019. Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_20_1","first-page":"7","article-title":"Star-net: a spatial attention residue network for scene text recognition","volume":"2","author":"Liu Wei","year":"2016","unstructured":"Wei Liu, Chaofeng Chen, Kwan-Yee K Wong, Zhizhong Su, and Junyu Han. 2016. Star-net: a spatial attention residue network for scene text recognition.. In BMVC, Vol. 2. 7.","journal-title":"BMVC"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-019-00320-5"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Yanhong Liu Fengming Cao and Yuqi Zhang. 2022. Generative Adversarial Examples for Sequential Text Recognition Models with Artistic Text Style.. In ICPRAM. 71--79.","DOI":"10.5220\/0010866800003122"},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium. 833--847","author":"Markwood Ian","year":"2017","unstructured":"Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu. 2017. PDF mirage: content masking attack against information-based online services. In Proceedings of the 26th USENIX Conference on Security Symposium. 833--847."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9382(01)00054-3"},{"key":"e_1_3_2_2_25_1","unstructured":"Myndex. 2022. Accessible Perceptual Contrast Algorithm. https:\/\/github.com\/ Myndex\/apca-w3."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524512"},{"key":"e_1_3_2_2_27_1","unstructured":"Visual Contrast of Text Subgroup. 2021. Visual Contrast Whitepa- per. https:\/\/www.w3.org\/WAI\/GL\/task-forces\/silver\/wiki\/Visual_Contrast_ of_Text_Subgroup\/Whitepaper."},{"key":"e_1_3_2_2_28_1","volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2646371"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.452"},{"key":"e_1_3_2_2_31_1","volume-title":"Fooling OCR systems with adversarial text images. arXiv preprint arXiv:1802.05385","author":"Song Congzheng","year":"2018","unstructured":"Congzheng Song and Vitaly Shmatikov. 2018. Fooling OCR systems with adversarial text images. arXiv preprint arXiv:1802.05385 (2018)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_2_33_1","volume-title":"Hiuk Jae Shim, and Yanyan Huang","author":"Ahvanooey Milad Taleby","year":"2018","unstructured":"Milad Taleby Ahvanooey, Qianmu Li, Hiuk Jae Shim, and Yanyan Huang. 2018. A comparative analysis of information hiding techniques for copyright protection of text documents. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742652"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"e_1_3_2_2_36_1","volume-title":"Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610","author":"Xiao Chaowei","year":"2018","unstructured":"Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, and Dawn Song. 2018. Generating adversarial examples with adversarial networks. arXiv preprint arXiv:1801.02610 (2018)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01232"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92310-5_62"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3245984"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412914"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162685"}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","location":"Ottawa ON Canada","acronym":"MM '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:03:59Z","timestamp":1755821039000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":41,"alternative-id":["10.1145\/3581783.3612076","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612076","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}