{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:40:04Z","timestamp":1756240804798,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Kaohsiung Chang Gung Memorial Hospital","doi-asserted-by":"publisher","award":["CMRPD3P0011"],"award-info":[{"award-number":["CMRPD3P0011"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science and Technology Council of the Republic of China, Taiwan","award":["NSTC 110-2221-E-182-026-MY3"],"award-info":[{"award-number":["NSTC 110-2221-E-182-026-MY3"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,14]]},"DOI":"10.1145\/3655755.3655778","type":"proceedings-article","created":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T12:19:10Z","timestamp":1717849150000},"page":"171-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9932-0594","authenticated-orcid":false,"given":"Yi-Hui","family":"Chen","sequence":"first","affiliation":[{"name":"Chang Gung University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2431-5336","authenticated-orcid":false,"given":"Meng-Yu","family":"Tsai","sequence":"additional","affiliation":[{"name":"Chang Gung University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5635-536X","authenticated-orcid":false,"given":"Shih-Hsin","family":"Chen","sequence":"additional","affiliation":[{"name":"Tamkang University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,6,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Discrete cosine transform","author":"Ahmed Nasir","year":"1974","unstructured":"Nasir Ahmed, T_ Natarajan, and Kamisetty\u00a0R Rao. 1974. Discrete cosine transform. IEEE transactions on Computers 100, 1 (1974), 90\u201393."},{"key":"e_1_3_2_1_2_1","unstructured":"Shumeet Baluja. 2017. Hiding Images in Plain Sight: Deep Steganography. In Neural Information Processing Systems. http:\/\/www.esprockets.com\/papers\/nips2017.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"An effective Image steganography using LSB Matching Revisited. vol 5","author":"Jadhav VV","year":"2016","unstructured":"VV Jadhav and PP Belagali. 2016. An effective Image steganography using LSB Matching Revisited. vol 5 (2016), 15\u201319."},{"key":"e_1_3_2_1_4_1","volume-title":"Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning. In 2023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 49\u201354","author":"Luo Jie","year":"2023","unstructured":"Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Yijing Chen, Wanjie Li, and Jiangchuan Li. 2023. Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning. In 2023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 49\u201354."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870357"},{"key":"e_1_3_2_1_6_1","volume-title":"An improvement on LSB matching and LSB matching revisited steganography methods. arXiv preprint arXiv:1709.06727","author":"Qazanfari Kazem","year":"2017","unstructured":"Kazem Qazanfari and Reza Safabakhsh. 2017. An improvement on LSB matching and LSB matching revisited steganography methods. arXiv preprint arXiv:1709.06727 (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3301-x"},{"key":"e_1_3_2_1_8_1","volume-title":"Fine-tuning CNN image retrieval with no human annotation","author":"Radenovi\u0107 Filip","year":"2018","unstructured":"Filip Radenovi\u0107, Giorgos Tolias, and Ond\u0159ej Chum. 2018. Fine-tuning CNN image retrieval with no human annotation. IEEE transactions on pattern analysis and machine intelligence 41, 7 (2018), 1655\u20131668."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202666"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.157290"},{"key":"e_1_3_2_1_11_1","article-title":"Hiding an image inside another image using variable-rate steganography","volume":"4","author":"Tamimi A","year":"2013","unstructured":"Abdelfatah\u00a0A Tamimi, Ayman\u00a0M Abdalla, and Omaima Al-Allaf. 2013. Hiding an image inside another image using variable-rate steganography. International Journal of Advanced Computer Science and Applications (IJACSA) 4, 10 (2013).","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"key":"e_1_3_2_1_13_1","unstructured":"Amirhossein Tavanaei. 2020. Embedded Encoder-Decoder in Convolutional Networks Towards Explainable AI. arxiv:2007.06712\u00a0[cs.CV]"},{"volume-title":"Human vision, visual processing, and digital display IV, Vol.\u00a01913","author":"Watson B","key":"e_1_3_2_1_14_1","unstructured":"Andrew\u00a0B Watson. 1993. DCT quantization matrices visually optimized for individual images. In Human vision, visual processing, and digital display IV, Vol.\u00a01913. SPIE, 202\u2013216."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_16_1","volume-title":"SteganoGAN: High capacity image steganography with GANs. arXiv preprint arXiv:1901.03892","author":"Zhang Kevin\u00a0Alex","year":"2019","unstructured":"Kevin\u00a0Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. 2019. SteganoGAN: High capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019)."},{"key":"e_1_3_2_1_17_1","volume-title":"Invisible steganography via generative adversarial networks. Multimedia tools and applications 78","author":"Zhang Ru","year":"2019","unstructured":"Ru Zhang, Shiqi Dong, and Jianyi Liu. 2019. Invisible steganography via generative adversarial networks. Multimedia tools and applications 78 (2019), 8559\u20138575."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"}],"event":{"name":"IVSP 2024: 2024 6th International Conference on Image, Video and Signal Processing","acronym":"IVSP 2024","location":"Ikuta Japan"},"container-title":["2024 6th International Conference on Image Video and Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655755.3655778","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3655755.3655778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T20:06:43Z","timestamp":1756238803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3655755.3655778"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":18,"alternative-id":["10.1145\/3655755.3655778","10.1145\/3655755"],"URL":"https:\/\/doi.org\/10.1145\/3655755.3655778","relation":{},"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"2024-06-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}