{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:59:26Z","timestamp":1762325966870,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,24]]},"DOI":"10.1145\/3670105.3670167","type":"proceedings-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T18:29:36Z","timestamp":1722277776000},"page":"364-369","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["HiDRNet: Hiding image with Deep Reversible Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1583-1867","authenticated-orcid":false,"given":"Yunlong","family":"Li","sequence":"first","affiliation":[{"name":"Yunnan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8716-1127","authenticated-orcid":false,"given":"Weiwei","family":"Zeng","sequence":"additional","affiliation":[{"name":"Yunnan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2578-2397","authenticated-orcid":false,"given":"Lei","family":"Li","sequence":"additional","affiliation":[{"name":"Yunnan University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2017","author":"Agustsson Eirikur","year":"2017","unstructured":"Eirikur Agustsson and Radu Timofte. 2017. NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2017, Honolulu, HI, USA, July 21-26, 2017. IEEE Computer Society, 1122\u20131131."},{"key":"e_1_3_2_1_2_1","volume-title":"Hiding images in plain sight: Deep steganography. Advances in neural information processing systems 30","author":"Baluja Shumeet","year":"2017","unstructured":"Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_4_1","volume-title":"Dynamic Convolution: Attention over Convolution Kernels. CoRR abs\/1912.03458","author":"Chen Yinpeng","year":"2019","unstructured":"Yinpeng Chen, Xiyang Dai, Mengchen Liu, Dongdong Chen, Lu Yuan, and Zicheng Liu. 2019. Dynamic Convolution: Attention over Convolution Kernels. CoRR abs\/1912.03458 (2019)."},{"key":"e_1_3_2_1_5_1","volume-title":"NICE: Non-linear Independent Components Estimation. In 3rd International Conference on Learning Representations, ICLR","author":"Dinh Laurent","year":"2015","unstructured":"Laurent Dinh, David Krueger, and Yoshua Bengio. 2015. NICE: Non-linear Independent Components Estimation. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Workshop Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891247"},{"key":"e_1_3_2_1_7_1","volume-title":"The Reversible Residual Network: Backpropagation Without Storing Activations. CoRR abs\/1707.04585","author":"Gomez N.","year":"2017","unstructured":"Aidan\u00a0N. Gomez, Mengye Ren, Raquel Urtasun, and Roger\u00a0B. Grosse. 2017. The Reversible Residual Network: Backpropagation Without Storing Activations. CoRR abs\/1707.04585 (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3141725"},{"key":"e_1_3_2_1_9_1","volume-title":"ste-GAN-ography: Generating Steganographic Images via Adversarial Training. CoRR abs\/1703.00371","author":"Hayes Jamie","year":"2017","unstructured":"Jamie Hayes and George Danezis. 2017. ste-GAN-ography: Generating Steganographic Images via Adversarial Training. CoRR abs\/1703.00371 (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net.","author":"Jacobsen J\u00f6rn-Henrik","year":"2018","unstructured":"J\u00f6rn-Henrik Jacobsen, Arnold W.\u00a0M. Smeulders, and Edouard Oyallon. 2018. i-RevNet: Deep Invertible Networks. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00469"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_13_1","volume-title":"A Survey of Image Information Hiding Algorithms Based on Deep Learning.CMES-Computer Modeling In Engineering & Sciences 117, 3","author":"Meng Ruohan","year":"2018","unstructured":"Ruohan Meng, Qi Cui, and Chengsheng Yuan. 2018. A Survey of Image Information Hiding Algorithms Based on Deep Learning.CMES-Computer Modeling In Engineering & Sciences 117, 3 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323873.3325011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10060054"},{"key":"e_1_3_2_1_18_1","volume-title":"SteganoGAN: High Capacity Image Steganography with GANs. CoRR abs\/1901.03892","author":"Zhang Kevin\u00a0Alex","year":"2019","unstructured":"Kevin\u00a0Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. 2019. SteganoGAN: High Capacity Image Steganography with GANs. CoRR abs\/1901.03892 (2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6951-z"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"}],"event":{"name":"CNIOT 2024: 2024 5th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT 2024","location":"Tokyo Japan"},"container-title":["Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670105.3670167","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670105.3670167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:51:58Z","timestamp":1755877918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670105.3670167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":20,"alternative-id":["10.1145\/3670105.3670167","10.1145\/3670105"],"URL":"https:\/\/doi.org\/10.1145\/3670105.3670167","relation":{},"subject":[],"published":{"date-parts":[[2024,5,24]]},"assertion":[{"value":"2024-07-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}