{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:36:53Z","timestamp":1760524613202,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1145\/3625468.3647611","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T06:10:01Z","timestamp":1713334201000},"page":"56-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["FlexMark"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9708-0670","authenticated-orcid":false,"given":"Mohammad Amin","family":"Arab","sequence":"first","affiliation":[{"name":"School of Computing Science Simon Fraser University Burnaby, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7383-8105","authenticated-orcid":false,"given":"Ali","family":"Ghorbanpour","sequence":"additional","affiliation":[{"name":"School of Computing Science Simon Fraser University Burnaby, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3261-4376","authenticated-orcid":false,"given":"Mohamed","family":"Hefeeda","sequence":"additional","affiliation":[{"name":"School of Computing Science Simon Fraser University Burnaby, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10368-9"},{"key":"e_1_3_2_1_3_1","unstructured":"Lori Cameron. 2017. Hackers' latest weapon: Steganography: IEEE Computer Society. https:\/\/www.computer.org\/publications\/tech-news\/research\/how-steganography-works"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0613641"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE1.2018.8374221"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25633"},{"key":"e_1_3_2_1_8_1","volume-title":"DeepMIH: Deep Invertible Network for Multiple Image Hiding","author":"Guan Zhenyu","year":"2022","unstructured":"Zhenyu Guan, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. 2022. DeepMIH: Deep Invertible Network for Multiple Image Hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022)."},{"key":"e_1_3_2_1_9_1","volume-title":"Hui Jiang, and Roland Memisevic.","author":"Im Daniel Jiwoong","year":"2016","unstructured":"Daniel Jiwoong Im, Chris Dongjoo Kim, Hui Jiang, and Roland Memisevic. 2016. Generating images with recurrent adversarial networks. arXiv preprint arXiv:1602.05110 (2016)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"volume-title":"Security and Watermarking of Multimedia contents","author":"Kalker Ton","key":"e_1_3_2_1_12_1","unstructured":"Ton Kalker, Geert Depovere, Jaap Haitsma, and Maurice JJJB Maes. 1999. Video watermarking system for broadcast monitoring. In Security and Watermarking of Multimedia contents, Vol. 3657. SPIE, 103--112."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mehy.2020.109691"},{"key":"e_1_3_2_1_14_1","volume-title":"2016 International Conference on Communication and Signal Processing(ICCSP). IEEE, 0448--0451","author":"Senthil Kumaran N","year":"2016","unstructured":"N Senthil Kumaran and S Abinaya. 2016. Comparison analysis of digital image watermarking using DWT and LSB technique. In 2016 International Conference on Communication and Signal Processing(ICCSP). IEEE, 0448--0451."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24121762"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351025"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01067"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01356"},{"key":"e_1_3_2_1_20_1","volume-title":"Digital image steganography: A literature survey. Information Sciences","author":"Mandal Pratap Chandra","year":"2022","unstructured":"Pratap Chandra Mandal, Imon Mukherjee, Goutam Paul, and BN Chatterji. 2022. Digital image steganography: A literature survey. Information Sciences (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09129-5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3127-y"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08178-9"},{"volume-title":"Advances in Intelligent Information Hiding and Multimedia Signal Processing","author":"Qian Zhenxing","key":"e_1_3_2_1_24_1","unstructured":"Zhenxing Qian, Hang Zhou, Weiming Zhang, and Xinpeng Zhang. 2017. Robust steganography using texture synthesis. In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer, 25--33."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13735-020-00197-9"},{"key":"e_1_3_2_1_26_1","unstructured":"Maria L Ricci. 2010. United States Department of Justice. https:\/\/www.justice.gov\/sites\/default\/files\/opa\/legacy\/2010\/06\/28\/062810complaint2.pdf Accessed: 1-1-2023."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_28_1","volume-title":"Pacific Rim Conference on Multimedia. Springer, 534--544","author":"Shi Haichao","year":"2017","unstructured":"Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, and Xiaoyu Zhang. 2017. SSGAN: secure steganography based on generative adversarial networks. In Pacific Rim Conference on Multimedia. Springer, 534--544."},{"key":"e_1_3_2_1_29_1","volume-title":"Christy Atika Sari, et al.","author":"Susanto Ajib","year":"2018","unstructured":"Ajib Susanto, Eko Hari Rachmawanto, Christy Atika Sari, et al. 2018. A robust non-blind image watermarking method using 2-level HWT-DCT. In 2018 International Seminar on Application for Technology of Information and Communication. IEEE, 304--308."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3372-2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2881118"},{"key":"e_1_3_2_1_32_1","unstructured":"Denis Volkhonskiy Boris Borisenko and Evgeny Burnaev. 2016. Generative adversarial networks for image steganography. (2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2559429"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00767-6_73"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00772"},{"key":"e_1_3_2_1_37_1","volume-title":"International conference on machine learning. PMLR, 7354--7363","author":"Zhang Han","year":"2019","unstructured":"Han Zhang, Ian Goodfellow, Dimitris Metaxas, and Augustus Odena. 2019. Self-attention generative adversarial networks. In International conference on machine learning. PMLR, 7354--7363."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.011"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"MMSys '24: ACM Multimedia Systems Conference 2024","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Bari Italy","acronym":"MMSys '24"},"container-title":["Proceedings of the ACM Multimedia Systems Conference 2024 on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625468.3647611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625468.3647611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:27:59Z","timestamp":1755883679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625468.3647611"}},"subtitle":["Adaptive Watermarking Method for Images"],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":39,"alternative-id":["10.1145\/3625468.3647611","10.1145\/3625468"],"URL":"https:\/\/doi.org\/10.1145\/3625468.3647611","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}