{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T17:13:50Z","timestamp":1776446030934,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2023YFF0905000"],"award-info":[{"award-number":["2023YFF0905000"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3681149","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:49Z","timestamp":1729925989000},"page":"2757-2765","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["From Covert Hiding To Visual Editing: Robust Generative Video Steganography"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1855-8040","authenticated-orcid":false,"given":"Xueying","family":"Mao","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1766-9882","authenticated-orcid":false,"given":"Xiaoxiao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9636-6928","authenticated-orcid":false,"given":"Wanli","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7772-4517","authenticated-orcid":false,"given":"Zhenliang","family":"Gan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-6374","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0212-3501","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7932-9831","authenticated-orcid":false,"given":"Sheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3201019"},{"key":"e_1_3_2_1_2_1","volume-title":"Banach wasserstein gan. Advances in neural information processing systems","author":"Adler Jonas","year":"2018","unstructured":"Jonas Adler and Sebastian Lunz. 2018. Banach wasserstein gan. Advances in neural information processing systems, Vol. 31 (2018)."},{"key":"e_1_3_2_1_3_1","volume-title":"Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096","author":"Brock Andrew","year":"2018","unstructured":"Andrew Brock, Jeff Donahue, and Karen Simonyan. 2018. Large scale GAN training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"e_1_3_2_1_5_1","volume-title":"A new steganography algorithm based on color histograms for data embedding into raw video streams. computers & security","author":"Cetin Ozdemir","year":"2009","unstructured":"Ozdemir Cetin and A Turan Ozcerit. 2009. A new steganography algorithm based on color histograms for data embedding into raw video streams. computers & security, Vol. 28, 7 (2009), 670--682."},{"key":"e_1_3_2_1_6_1","volume-title":"Hiding data in images by simple LSB substitution. Pattern recognition","author":"Chan Chi-Kwong","year":"2004","unstructured":"Chi-Kwong Chan and Lee-Ming Cheng. 2004. Hiding data in images by simple LSB substitution. Pattern recognition, Vol. 37, 3 (2004), 469--474."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413630"},{"key":"e_1_3_2_1_8_1","volume-title":"Generative adversarial networks: An overview","author":"Creswell Antonia","year":"2018","unstructured":"Antonia Creswell, Tom White, Vincent Dumoulin, Kai Arulkumaran, Biswa Sengupta, and Anil A Bharath. 2018. Generative adversarial networks: An overview. IEEE signal processing magazine, Vol. 35, 1 (2018), 53--65."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-4722-2012-25"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Shichao Dong Jin Wang Renhe Ji and et al. 2023. Implicit Identity Leakage: The Stumbling Block to Improving Deepfake Detection Generalization. In CVPR.","DOI":"10.1109\/CVPR52729.2023.00389"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11389-6_18"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"e_1_3_2_1_14_1","volume-title":"Improved training of wasserstein gans. Advances in neural information processing systems","author":"Gulrajani Ishaan","year":"2017","unstructured":"Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. 2017. Improved training of wasserstein gans. Advances in neural information processing systems, Vol. 30 (2017)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-020-00500-y"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_17_1","volume-title":"Adaptive HEVC Video Steganography With High Performance Based on Attention-Net and PU Partition Modes","author":"He Songhan","year":"2023","unstructured":"Songhan He, Dawen Xu, Lin Yang, and Weipeng Liang. 2023. Adaptive HEVC Video Steganography With High Performance Based on Attention-Net and PU Partition Modes. IEEE Transactions on Multimedia (2023)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00224"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.167"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3140899"},{"key":"e_1_3_2_1_23_1","volume-title":"Materials & Continua","volume":"59","author":"Li Zhonghao","year":"2019","unstructured":"Zhonghao Li, Laijing Meng, Shutong Xu, Zhaohong Li, Yunqing Shi, and Yuanchang Liang. 2019. A HEVC Video Steganalysis Algorithm Based on PU Partition Modes. Computers, Materials & Continua, Vol. 59, 2 (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3075858"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.01065"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00234"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3155146"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00244"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00511"},{"key":"e_1_3_2_1_30_1","volume-title":"Ramlan Mahmod, and Adnan Gutub.","author":"Roslan Nuur Alifah","year":"2022","unstructured":"Nuur Alifah Roslan, Nur Izura Udzir, Ramlan Mahmod, and Adnan Gutub. 2022. Systematic literature review and analysis for Arabic text steganography method practically. Egyptian Informatics Journal (2022)."},{"key":"e_1_3_2_1_31_1","first-page":"433","article-title":"A prediction mode steganalysis detection algorithm for hevc","volume":"28","author":"Sheng Q","year":"2017","unstructured":"Q Sheng, RD Wang, ML Huang, Q Li, and D Xu. 2017. A prediction mode steganalysis detection algorithm for hevc. J Optoelectron-laser, Vol. 28, 4 (2017), 433--440.","journal-title":"J Optoelectron-laser"},{"key":"e_1_3_2_1_32_1","volume-title":"NIPS 2017 Workshop on Machine Learning and Computer Security","volume":"1","author":"Shin Richard","year":"2017","unstructured":"Richard Shin and Dawn Song. 2017. Jpeg-resistant adversarial images. In NIPS 2017 Workshop on Machine Learning and Computer Security, Vol. 1. 8."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2559429"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00917"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3206004.3206020"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Zhendong Wang Jianmin Bao and et al. 2023. AltFreezing for More General Video Face Forgery Detection. In CVPR.","DOI":"10.1109\/CVPR52729.2023.00402"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548217"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.02156"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01308"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01920"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019241"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548139"},{"key":"e_1_3_2_1_43_1","volume-title":"Universal detection of video steganography in multiple domains based on the consistency of motion vectors","author":"Zhai Liming","year":"2019","unstructured":"Liming Zhai, Lina Wang, and Yanzhen Ren. 2019. Universal detection of video steganography in multiple domains based on the consistency of motion vectors. IEEE transactions on information forensics and security, Vol. 15 (2019), 1762--1777."},{"key":"e_1_3_2_1_44_1","volume-title":"SteganoGAN: High capacity image steganography with GANs. arXiv preprint arXiv:1901.03892","author":"Zhang Kevin Alex","year":"2019","unstructured":"Kevin Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. 2019. SteganoGAN: High capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP55362.2022.9949466"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3268843"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3681149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:53Z","timestamp":1750294673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":47,"alternative-id":["10.1145\/3664647.3681149","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3681149","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}