{"id":"https://openalex.org/W4389599257","doi":"https://doi.org/10.48550/arxiv.2312.04743","title":"Hiding Functions within Functions: Steganography by Implicit Neural Representations","display_name":"Hiding Functions within Functions: Steganography by Implicit Neural Representations","publication_year":2023,"publication_date":"2023-12-07","ids":{"openalex":"https://openalex.org/W4389599257","doi":"https://doi.org/10.48550/arxiv.2312.04743"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2312.04743","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2312.04743","pdf_url":"https://arxiv.org/pdf/2312.04743","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2312.04743","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109146719","display_name":"Jia Liu","orcid":"https://orcid.org/0000-0001-8104-0079"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Liu, Jia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011317022","display_name":"Peng Luo","orcid":"https://orcid.org/0009-0004-3370-4191"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Luo, Peng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101734443","display_name":"Yan Ke","orcid":"https://orcid.org/0000-0002-6229-9998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ke, Yan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Qian, Dang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qian, Dang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Minqing, Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minqing, Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Dejun, Mu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dejun, Mu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5109146719"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.9573097229003906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7662319540977478},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.6235098242759705},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5653796195983887},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5344566106796265},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.5304393768310547},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5257079005241394},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5071573257446289},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.49949193000793457},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4932820200920105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44349849224090576},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4274165630340576},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.42354488372802734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4041891098022461},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3898874521255493},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1314765214920044},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.06764140725135803},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06747999787330627}],"concepts":[{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.9573097229003906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7662319540977478},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.6235098242759705},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5653796195983887},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5344566106796265},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.5304393768310547},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5257079005241394},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5071573257446289},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49949193000793457},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4932820200920105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44349849224090576},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4274165630340576},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.42354488372802734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4041891098022461},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3898874521255493},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1314765214920044},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.06764140725135803},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06747999787330627},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C21880701","wikidata":"https://www.wikidata.org/wiki/Q2144042","display_name":"Process engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2312.04743","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2312.04743","pdf_url":"https://arxiv.org/pdf/2312.04743","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2312.04743","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2312.04743","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2312.04743","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2312.04743","pdf_url":"https://arxiv.org/pdf/2312.04743","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.8399999737739563,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2245157826","display_name":"Collaborative Research: STEM Learning Embedded in a Machine-in-the-LoopCollaborative Story Writing Game","funder_award_id":"2202496","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4670081295","display_name":"Renovation and Furnishing  of Research Facilities for the Department of Dairy Science;","funder_award_id":"6220249","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G473269127","display_name":null,"funder_award_id":"62074131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6711226571","display_name":null,"funder_award_id":"62202496","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8477021850","display_name":null,"funder_award_id":"62272478","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389599257.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2560172240","https://openalex.org/W3146660591","https://openalex.org/W1995538220","https://openalex.org/W3020816551","https://openalex.org/W2338095724","https://openalex.org/W2804412098","https://openalex.org/W2186632617","https://openalex.org/W83713408","https://openalex.org/W2497446005","https://openalex.org/W2171676767"],"abstract_inverted_index":{"Deep":[0],"steganography":[1],"utilizes":[2,45],"the":[3,29,66,70,89,93,100,123],"powerful":[4],"capabilities":[5],"of":[6,107,116],"deep":[7],"neural":[8],"networks":[9],"to":[10,28,50,87,98,112,126,139],"embed":[11],"and":[12,69,136],"extract":[13],"messages,":[14],"but":[15],"its":[16,24],"reliance":[17],"on":[18,76,134],"an":[19],"additional":[20],"message":[21,67],"extractor":[22,68],"limits":[23],"practical":[25],"use":[26,83,106],"due":[27],"added":[30],"suspicion":[31],"it":[32,111],"can":[33],"raise":[34],"from":[35,92],"steganalyzers.":[36],"To":[37,118],"address":[38],"this":[39,121],"problem,":[40],"we":[41],"propose":[42],"StegaINR,":[43],"which":[44,62],"Implicit":[46],"Neural":[47],"Representation":[48],"(INR)":[49],"implement":[51],"steganography.":[52,130],"StegaINR":[53],"embeds":[54],"a":[55,59,77,84],"secret":[56,90,101],"function":[57,91],"into":[58,129],"stego":[60,71,94],"function,":[61,95],"serves":[63],"as":[64],"both":[65],"media":[72],"for":[73],"secure":[74],"transmission":[75],"public":[78],"channel.":[79],"Recipients":[80],"need":[81],"only":[82],"shared":[85],"key":[86],"recover":[88],"allowing":[96],"them":[97],"obtain":[99],"message.":[102],"Our":[103],"approach":[104],"makes":[105],"continuous":[108],"functions,":[109],"enabling":[110],"handle":[113],"various":[114],"types":[115],"messages.":[117],"our":[119,141],"knowledge,":[120],"is":[122],"first":[124],"work":[125],"introduce":[127],"INR":[128],"We":[131],"performed":[132],"evaluations":[133],"image":[135],"climate":[137],"data":[138],"test":[140],"method":[142],"in":[143],"different":[144],"deployment":[145],"contexts.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
