{"id":"https://openalex.org/W3192789783","doi":"https://doi.org/10.1109/tifs.2021.3104140","title":"MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography","display_name":"MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3192789783","doi":"https://doi.org/10.1109/tifs.2021.3104140","mag":"3192789783"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3104140","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2103.13689","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043791595","display_name":"Xianbo Mo","orcid":"https://orcid.org/0000-0001-9198-5041"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianbo Mo","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023503629","display_name":"Shunquan Tan","orcid":"https://orcid.org/0000-0002-7457-3691"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shunquan Tan","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365163","display_name":"Bin Li","orcid":"https://orcid.org/0000-0002-2613-5451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047964483","display_name":"Jiwu Huang","orcid":"https://orcid.org/0000-0002-7625-5689"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Huang","raw_affiliation_strings":["College of Information Engineering, Shenzhen University, Shenzhen, China","Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ), Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.375,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":23,"citation_normalized_percentile":{"value":0.728963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"16","issue":null,"first_page":"4306","last_page":"4320"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Image Forgery Detection and Identification","score":0.9931,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganalysis","display_name":"Steganalysis","score":0.69351834},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.590148},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.525933},{"id":"https://openalex.org/keywords/image-forgery-detection","display_name":"Image Forgery Detection","score":0.519346},{"id":"https://openalex.org/keywords/resampling-detection","display_name":"Resampling Detection","score":0.510847},{"id":"https://openalex.org/keywords/information-embedding","display_name":"Information Embedding","score":0.508282},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.4936341},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.49243745},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.46926826},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.45577976}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.8298187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81803983},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.79754585},{"id":"https://openalex.org/C107368093","wikidata":"https://www.wikidata.org/wiki/Q448176","display_name":"Steganalysis","level":4,"score":0.69351834},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.63139164},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.590148},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.4936341},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.49243745},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4824758},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.46926826},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.45577976},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.44974852},{"id":"https://openalex.org/C46149586","wikidata":"https://www.wikidata.org/wiki/Q11785332","display_name":"Monte Carlo tree search","level":3,"score":0.44021073},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.43476218},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36852664},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10961965},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3104140","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2103.13689","pdf_url":"https://arxiv.org/pdf/2103.13689","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2103.13689","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2103.13689","pdf_url":"https://arxiv.org/pdf/2103.13689","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.58,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U19B2022"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772349"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61872244"},{"funder":"https://openalex.org/F4320329801","funder_display_name":"Shenzhen Research and Development Program","award_id":"JCYJ20200109105008228"},{"funder":"https://openalex.org/F4320336405","funder_display_name":"Special Project for Research and Development in Key areas of Guangdong Province","award_id":"2019B010139003"},{"funder":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","award_id":"2019B151502001"}],"datasets":[],"versions":["https://openalex.org/W3138564696","https://openalex.org/W3192789783"],"referenced_works_count":52,"referenced_works":["https://openalex.org/W1604614341","https://openalex.org/W1932198206","https://openalex.org/W1955882805","https://openalex.org/W1965064373","https://openalex.org/W1973466159","https://openalex.org/W1976570511","https://openalex.org/W2009130368","https://openalex.org/W2046180645","https://openalex.org/W2055625960","https://openalex.org/W2081564928","https://openalex.org/W2096156898","https://openalex.org/W2097435234","https://openalex.org/W2108598243","https://openalex.org/W2111900533","https://openalex.org/W2124664712","https://openalex.org/W2126316555","https://openalex.org/W2134527668","https://openalex.org/W2154026545","https://openalex.org/W2156722235","https://openalex.org/W2168405694","https://openalex.org/W2170598445","https://openalex.org/W22271197","https://openalex.org/W2257979135","https://openalex.org/W2277839806","https://openalex.org/W2291390035","https://openalex.org/W2322622188","https://openalex.org/W2538511122","https://openalex.org/W2542290803","https://openalex.org/W2565257220","https://openalex.org/W2597305026","https://openalex.org/W2610979719","https://openalex.org/W2621048556","https://openalex.org/W2680958618","https://openalex.org/W2735904389","https://openalex.org/W2751202750","https://openalex.org/W2766447205","https://openalex.org/W2775462490","https://openalex.org/W2809534270","https://openalex.org/W2892948265","https://openalex.org/W2949862294","https://openalex.org/W2955425717","https://openalex.org/W2963957509","https://openalex.org/W2966816175","https://openalex.org/W2982705681","https://openalex.org/W3013708462","https://openalex.org/W3037681428","https://openalex.org/W3044394060","https://openalex.org/W3088440139","https://openalex.org/W3092405519","https://openalex.org/W3133932568","https://openalex.org/W3174051263","https://openalex.org/W4239092273"],"related_works":["https://openalex.org/W4309385482","https://openalex.org/W4243922849","https://openalex.org/W2939392096","https://openalex.org/W2357125417","https://openalex.org/W2241212938","https://openalex.org/W2160587766","https://openalex.org/W2148973528","https://openalex.org/W2106726851","https://openalex.org/W1966340347","https://openalex.org/W1529294424"],"abstract_inverted_index":{"Recent":[0],"research":[1],"has":[2,126],"shown":[3],"that":[4,148],"non-additive":[5,27,47,61,132],"image":[6,42],"steganographic":[7,62,133],"frameworks":[8],"effectively":[9,151],"improve":[10],"security":[11,169],"performance":[12,170],"through":[13],"adjusting":[14],"distortion":[15,63,99],"distribution.":[16],"However,":[17],"as":[18,20],"far":[19],"we":[21,57,79],"know,":[22],"all":[23],"of":[24,155,171,177],"the":[25,70,75,128,153,168,175,178],"existing":[26],"proposals":[28],"are":[29],"based":[30],"on":[31],"handcrafted":[32],"policies,":[33],"and":[34,86,121,141,159,165],"can":[35,136,150],"only":[36],"be":[37],"applied":[38],"to":[39,68,90,97,110,117],"a":[40,181],"specific":[41],"domain,":[43],"which":[44,135],"heavily":[45],"prevent":[46],"steganography":[48],"from":[49,113],"releasing":[50],"its":[51,118],"full":[52],"potentiality.":[53],"In":[54,162],"this":[55],"paper,":[56],"propose":[58],"an":[59],"automatic":[60],"learning":[64,77],"framework":[65,134],"called":[66],"MCTSteg":[67,125,149,172],"remove":[69],"above":[71],"restrictions.":[72],"Guided":[73],"by":[74,180],"reinforcement":[76],"paradigm,":[78],"combine":[80],"Monte":[81],"Carlo":[82],"Tree":[83],"Search":[84],"(MCTS)":[85],"steganalyzer-based":[87],"environmental":[88,106],"model":[89,107],"build":[91],"MCTSteg.":[92],"MCTS":[93],"makes":[94],"sequential":[95],"decisions":[96],"adjust":[98],"distribution":[100],"without":[101],"human":[102],"intervention.":[103],"Our":[104],"proposed":[105],"is":[108],"used":[109],"obtain":[111],"feedbacks":[112],"each":[114],"decision.":[115],"Due":[116],"self-learning":[119],"characteristic":[120],"domain-independent":[122],"reward":[123],"function,":[124],"become":[127],"first":[129],"reported":[130],"universal":[131],"work":[137],"in":[138],"both":[139,156,163],"spatial":[140,164],"JPEG":[142,166],"domains.":[143],"Extensive":[144],"experimental":[145],"results":[146],"show":[147],"withstand":[152],"detection":[154],"hand-crafted":[157],"feature-based":[158],"deep-learning-based":[160],"steganalyzers.":[161],"domains,":[167],"steadily":[173],"outperforms":[174],"state":[176],"art":[179],"clear":[182],"margin":[183],"under":[184],"different":[185],"scenarios.":[186]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3192789783","counts_by_year":[{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":8},{"year":2021,"cited_by_count":4}],"updated_date":"2024-11-30T03:23:40.159495","created_date":"2021-08-16"}