{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:00:00Z","timestamp":1769068800045,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2023A1515011928"],"award-info":[{"award-number":["2023A1515011928"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272197"],"award-info":[{"award-number":["62272197"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,6]]},"DOI":"10.1145\/3595916.3626359","type":"proceedings-article","created":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T16:34:41Z","timestamp":1704126881000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient CNN-based Prediction for Reversible Data Hiding"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3563-9260","authenticated-orcid":false,"given":"Mingjin","family":"Wu","sequence":"first","affiliation":[{"name":"Jinan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3481-7057","authenticated-orcid":false,"given":"Shijun","family":"Xiang","sequence":"additional","affiliation":[{"name":"Jinan University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,1]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Reversible watermark using the difference expansion of a generalized integer transform","author":"Alattar M","year":"2004","unstructured":"Adnan\u00a0 M Alattar . 2004. Reversible watermark using the difference expansion of a generalized integer transform . IEEE transactions on image processing 13, 8 ( 2004 ), 1147\u20131156. Adnan\u00a0M Alattar. 2004. Reversible watermark using the difference expansion of a generalized integer transform. IEEE transactions on image processing 13, 8 (2004), 1147\u20131156."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542205.2542207"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2145372"},{"key":"e_1_3_2_1_4_1","volume-title":"Low distortion transform for reversible watermarking","author":"Coltuc Dinu","year":"2011","unstructured":"Dinu Coltuc . 2011. Low distortion transform for reversible watermarking . IEEE transactions on image processing 21, 1 ( 2011 ), 412\u2013417. Dinu Coltuc. 2011. Low distortion transform for reversible watermarking. IEEE transactions on image processing 21, 1 (2011), 412\u2013417."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_6_1","volume-title":"Kodak lossless true color image suite. source: http:\/\/r0k. us\/graphics\/kodak 4, 2","author":"Franzen Rich","year":"1999","unstructured":"Rich Franzen . 1999. Kodak lossless true color image suite. source: http:\/\/r0k. us\/graphics\/kodak 4, 2 ( 1999 ), 9. Rich Franzen. 1999. Kodak lossless true color image suite. source: http:\/\/r0k. us\/graphics\/kodak 4, 2 (1999), 9."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3036727"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3059202"},{"key":"e_1_3_2_1_9_1","first-page":"10196","article-title":"Reversible data hiding by using CNN prediction and adaptive embedding","volume":"44","author":"Hu Runwen","year":"2021","unstructured":"Runwen Hu and Shijun Xiang . 2021 . Reversible data hiding by using CNN prediction and adaptive embedding . IEEE Transactions on Pattern Analysis and Machine Intelligence 44 , 12 (2021), 10196 \u2013 10208 . Runwen Hu and Shijun Xiang. 2021. Reversible data hiding by using CNN prediction and adaptive embedding. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 12 (2021), 10196\u201310208.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_10_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma P","year":"2014","unstructured":"Diederik\u00a0 P Kingma and Jimmy Ba . 2014 . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik\u00a0P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"108561","DOI":"10.1016\/j.sigpro.2022.108561","article-title":"Audio-lossless robust watermarking against desynchronization attacks","volume":"198","author":"Li Jingxuan","year":"2022","unstructured":"Jingxuan Li and Shijun Xiang . 2022 . Audio-lossless robust watermarking against desynchronization attacks . Signal Processing 198 (2022), 108561 . Jingxuan Li and Shijun Xiang. 2022. Audio-lossless robust watermarking against desynchronization attacks. Signal Processing 198 (2022), 108561.","journal-title":"Signal Processing"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2444354"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3184949"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","article-title":"Reversible image watermarking using interpolation technique","volume":"5","author":"Luo Lixin","year":"2009","unstructured":"Lixin Luo , Zhenyong Chen , Ming Chen , Xiao Zeng , and Zhang Xiong . 2009 . Reversible image watermarking using interpolation technique . IEEE Transactions on information forensics and security 5 , 1 (2009), 187 \u2013 193 . Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, and Zhang Xiong. 2009. Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security 5, 1 (2009), 187\u2013193.","journal-title":"IEEE Transactions on information forensics and security"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487268.2487272"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"e_1_3_2_1_19_1","volume-title":"UCID: An uncompressed color image database. In Storage and retrieval methods and applications for multimedia","author":"Schaefer Gerald","year":"2003","unstructured":"Gerald Schaefer and Michal Stich . 2003 . UCID: An uncompressed color image database. In Storage and retrieval methods and applications for multimedia 2004, Vol.\u00a05307. SPIE , 472\u2013480. Gerald Schaefer and Michal Stich. 2003. UCID: An uncompressed color image database. In Storage and retrieval methods and applications for multimedia 2004, Vol.\u00a05307. SPIE, 472\u2013480."},{"key":"e_1_3_2_1_20_1","volume-title":"Expansion embedding techniques for reversible watermarking","author":"Thodi M","year":"2007","unstructured":"Diljith\u00a0 M Thodi and Jeffrey\u00a0 J Rodr\u00edguez . 2007. Expansion embedding techniques for reversible watermarking . IEEE transactions on image processing 16, 3 ( 2007 ), 721\u2013730. Diljith\u00a0M Thodi and Jeffrey\u00a0J Rodr\u00edguez. 2007. Expansion embedding techniques for reversible watermarking. IEEE transactions on image processing 16, 3 (2007), 721\u2013730."},{"key":"e_1_3_2_1_21_1","volume-title":"Reversible data embedding using a difference expansion","author":"Tian Jun","year":"2003","unstructured":"Jun Tian . 2003. Reversible data embedding using a difference expansion . IEEE transactions on circuits and systems for video technology 13, 8 ( 2003 ), 890\u2013896. Jun Tian. 2003. Reversible data embedding using a difference expansion. IEEE transactions on circuits and systems for video technology 13, 8 (2003), 890\u2013896."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512797"},{"key":"e_1_3_2_1_24_1","volume-title":"Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H. 264\/AVC. Signal processing: image communication 47","author":"Xu Dawen","year":"2016","unstructured":"Dawen Xu and Rangding Wang . 2016. Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H. 264\/AVC. Signal processing: image communication 47 ( 2016 ), 369\u2013379. Dawen Xu and Rangding Wang. 2016. Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H. 264\/AVC. Signal processing: image communication 47 (2016), 369\u2013379."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/LSP.2022.3231193","article-title":"New CNN-based predictor for reversible data hiding","volume":"29","author":"Yang Xie","year":"2022","unstructured":"Xie Yang and Fangjun Huang . 2022 . New CNN-based predictor for reversible data hiding . IEEE Signal Processing Letters 29 (2022), 2627 \u2013 2631 . Xie Yang and Fangjun Huang. 2022. New CNN-based predictor for reversible data hiding. IEEE Signal Processing Letters 29 (2022), 2627\u20132631.","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2963766"}],"event":{"name":"MMAsia '23: ACM Multimedia Asia","location":"Tainan Taiwan","acronym":"MMAsia '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["ACM Multimedia Asia 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3595916.3626359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3595916.3626359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:48:39Z","timestamp":1750286919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3595916.3626359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":26,"alternative-id":["10.1145\/3595916.3626359","10.1145\/3595916"],"URL":"https:\/\/doi.org\/10.1145\/3595916.3626359","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2024-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}