{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:16:01Z","timestamp":1725783361058},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612399","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T11:26:54Z","timestamp":1698406014000},"page":"8316-8326","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1398-6222","authenticated-orcid":false,"given":"Dongxia","family":"Huang","sequence":"first","affiliation":[{"name":"Guangdong Key Lab of Information Security Technology & School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8999-6064","authenticated-orcid":false,"given":"Weiqi","family":"Luo","sequence":"additional","affiliation":[{"name":"Guangdong Key Lab of Information Security Technology & School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0979-8613","authenticated-orcid":false,"given":"Peijia","family":"Zheng","sequence":"additional","affiliation":[{"name":"Guangdong Key Lab of Information Security Technology, School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7625-5689","authenticated-orcid":false,"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[{"name":"Guangdong Key Laboratory of Intelligent Information Processing, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042445.2042452"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3021913"},{"volume-title":"Optimizing Additive Approximations of Non-additive Distortion Functions. In ACM Workshop on Information Hiding and Multimedia Security. ACM, 105--112","year":"2021","author":"Bernard Sol\u00e8","key":"e_1_3_2_1_3_1","unstructured":"Sol\u00e8 ne Bernard , Patrick Bas , Tom\u00e1 s Pevn\u00fd , and John Klein . 2021 . Optimizing Additive Approximations of Non-additive Distortion Functions. In ACM Workshop on Information Hiding and Multimedia Security. ACM, 105--112 . Sol\u00e8 ne Bernard, Patrick Bas, Tom\u00e1 s Pevn\u00fd, and John Klein. 2021. Optimizing Additive Approximations of Non-additive Distortion Functions. In ACM Workshop on Information Hiding and Multimedia Security. ACM, 105--112."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871749"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00916"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3111713"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335203.3335739"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134094"},{"volume-title":"Fridrich and Tom\u00e1s Filler","year":"2007","author":"Jessica","key":"e_1_3_2_1_9_1","unstructured":"Jessica J. Fridrich and Tom\u00e1s Filler . 2007 . Practical methods for minimizing embedding impact in steganography. In Security, Steganography, and Watermarking of Multimedia Contents. SPIE , 650502. Jessica J. Fridrich and Tom\u00e1s Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Security, Steganography, and Watermarking of Multimedia Contents. SPIE, 650502."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190402"},{"key":"e_1_3_2_1_11_1","unstructured":"Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Neural Information Processing Systems. ACM 2672--2680. Ian J. Goodfellow Jean Pouget-Abadie Mehdi Mirza Bing Xu David Warde-Farley Sherjil Ozair Aaron C. Courville and Yoshua Bengio. 2014. Generative adversarial nets. In Neural Information Processing Systems. ACM 2672--2680."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102779"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2434600"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2982624"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3111748"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3182041"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS47025.2019.9035101"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3244094"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3148406"},{"volume-title":"U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention","year":"2015","author":"Ronneberger Olaf","key":"e_1_3_2_1_23_1","unstructured":"Olaf Ronneberger , Philipp Fischer , and Thomas Brox . 2015 . U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention , Vol. 9351 . Springer , 234--241. Olaf Ronneberger, Philipp Fischer, and Thomas Brox. 2015. U-net: Convolutional networks for biomedical image segmentation. In Medical Image Computing and Computer-Assisted Intervention, Vol. 9351. Springer, 234--241."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414723"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025438"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2891237"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00631"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2548421"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2922229"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461438"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2936913"},{"volume-title":"IEEE International Conference on Computer Vision. IEEE, 2242--2251","author":"Zhu Jun-Yan","key":"e_1_3_2_1_34_1","unstructured":"Jun-Yan Zhu , Taesung Park , Phillip Isola , and Alexei A. Efros . 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks . In IEEE International Conference on Computer Vision. IEEE, 2242--2251 . Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE International Conference on Computer Vision. IEEE, 2242--2251."}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Ottawa ON Canada","acronym":"MM '23"},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:59:28Z","timestamp":1705453168000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":34,"alternative-id":["10.1145\/3581783.3612399","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612399","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}