{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:18:50Z","timestamp":1772644730030,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972143"],"award-info":[{"award-number":["61972143"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,1,31]]},"abstract":"<jats:p>Image steganography is a technique used to conceal secret information within cover images without being detected. However, the advent of convolutional neural networks (CNNs) has threatened the security of image steganography. Due to the inherent properties of adversarial examples, adding perturbations to stego images can mislead the CNN-based image steganalysis, but it also easily leads to some errors when extracting secret information. Recently, some adversarial embedding methods have been proposed for improving image steganography security. In this work, we aim at furthering enhance the security of adversarial embedding-based image steganography by exploiting the strong correlation between adjacent pixels. Specifically, we divide the cover image into four non-overlapping parts for four-stage information embedding. During the adversarial embedding process, we cluster the modification directions of adjacent pixels and select only those with relatively larger amplitudes of gradients and smaller embedding costs to update their original embedding costs. Experimental results demonstrate that our proposed method can effectively fool targeted steganalyzers and outperform state-of-the-art techniques under different scenarios.<\/jats:p>","DOI":"10.1145\/3603377","type":"journal-article","created":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T10:15:47Z","timestamp":1685787347000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1860-3021","authenticated-orcid":false,"given":"Dewang","family":"Wang","sequence":"first","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2734-659X","authenticated-orcid":false,"given":"Gaobo","family":"Yang","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6412-334X","authenticated-orcid":false,"given":"Zhiqing","family":"Guo","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8883-9430","authenticated-orcid":false,"given":"Jiyou","family":"Chen","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,18]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"e_1_3_1_3_2","first-page":"2016","article-title":"Image database of BOWS-2","volume":"20","author":"Bas Patrick","year":"2017","unstructured":"Patrick Bas and Teddy Furon. 2017. Image database of BOWS-2. Accessed: Jun 20 (2017), 2016\u20132017. [online] Available: http:\/\/bows2.ec-lille.fr\/","journal-title":"Accessed: Jun"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021913"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756620"},{"key":"e_1_3_1_8_2","first-page":"48","article-title":"Selection-channel-aware rich model for Steganalysis of digital images","author":"Denemark Tom\u00e1s","year":"2014","unstructured":"Tom\u00e1s Denemark, Vahid Sedighi, Vojtech Holub, R\u00e9mi Cogranne, and Jessica J. Fridrich. 2014. Selection-channel-aware rich model for Steganalysis of digital images. 2014 IEEE International Workshop on Information Forensics and Security(2014), 48\u201353.","journal-title":"2014 IEEE International Workshop on Information Forensics and Security"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335739"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2010.2077629"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.697471"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_1_13_2","first-page":"2672","volume-title":"Proceedings of the NIPS","author":"Goodfellow Ian J.","year":"2014","unstructured":"Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the NIPS. 2672\u20132680."},{"key":"e_1_3_1_14_2","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. arXiv:1412.6572. Retrieved from https:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_1_15_2","first-page":"234","article-title":"Designing steganographic distortion using directional filters","author":"Holub Vojtech","year":"2012","unstructured":"Vojtech Holub and Jessica J. Fridrich. 2012. Designing steganographic distortion using directional filters. 2012 IEEE International Workshop on Information Forensics and Security(2012), 234\u2013239.","journal-title":"2012 IEEE International Workshop on Information Forensics and Security"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"e_1_3_1_17_2","first-page":"4206","article-title":"A new cost function for spatial image steganography","author":"Li Bin","year":"2014","unstructured":"Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2014. A new cost function for spatial image steganography. 2014 IEEE International Conference on Image Processing(2014), 4206\u20134210.","journal-title":"2014 IEEE International Conference on Image Processing"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2434600"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3111748"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3182041"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07994-3"},{"key":"e_1_3_1_22_2","unstructured":"Aleksander Madry Aleksandar Makelov Ludwig Schmidt Dimitris Tsipras and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083. Retrieved from https:\/\/arxiv.org\/abs\/1706.06083"},{"key":"e_1_3_1_23_2","unstructured":"Nicolas Papernot Patrick McDaniel and Ian Goodfellow. 2016. Transferability in machine learning: From phenomena to black-box attacks using adversarial samples. arXiv:1605.07277. Retrieved from https:\/\/arxiv.org\/abs\/1605.07277"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_18"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_3_1_28_2","first-page":"534","volume-title":"Proceedings of the Pacific Rim Conference on Multimedia","author":"Shi Haichao","year":"2017","unstructured":"Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, and Xiaoyu Zhang. 2017. SSGAN: Secure steganography based on generative adversarial networks. In Proceedings of the Pacific Rim Conference on Multimedia. Springer, 534\u2013544."},{"key":"e_1_3_1_29_2","first-page":"1","article-title":"Hiding message using a cycle generative adversarial network","author":"Shi Wuzhen","year":"2022","unstructured":"Wuzhen Shi and Shaohui Liu. 2022. Hiding message using a cycle generative adversarial network. ACM Transactions on Multimedia Computing, Communications, and Applications 18, 3s (2022), 1\u201315.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_1_33_2","unstructured":"Denis Volkhonskiy Ivan Nazarov and Evgeny Burnaev. 2017. Steganographic Generative Adversarial Networks. 12th International Conference on Machine Vision (ICMV\u201919) . Vol. 11433 (2017) 991\u20131005."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206012"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:25Z","timestamp":1750178785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,31]]}},"alternative-id":["10.1145\/3603377"],"URL":"https:\/\/doi.org\/10.1145\/3603377","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,18]]},"assertion":[{"value":"2022-08-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}