Image steganography based on style transfer and quaternion exponent moments

[1]  Leon A. Gatys,et al.  Texture Synthesis Using Convolutional Neural Networks , 2015, NIPS.

[2]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[3]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[4]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[5]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Xingyuan Wang,et al.  Image Description With Polar Harmonic Fourier Moments , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[7]  Eero P. Simoncelli,et al.  A Parametric Texture Model Based on Joint Statistics of Complex Wavelet Coefficients , 2000, International Journal of Computer Vision.

[8]  Kai Liu,et al.  Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.

[9]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[10]  Bin Li,et al.  A New Payload Partition Strategy in Color Image Steganography , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Leon A. Gatys,et al.  Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  WangXiangyang,et al.  Quaternion Exponent Moments Based Robust Color Image Watermarking , 2016 .

[13]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[14]  Rafia Rahim,et al.  End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.

[15]  Wang Qi-sheng A Construction of Digital Watermarking Model for the Vector Geospatial Data Based on Magnitude and Phase of DFT , 2011 .

[16]  Piotr Koniusz,et al.  Identity-Preserving Face Recovery from Portraits , 2018, 2018 IEEE Winter Conference on Applications of Computer Vision (WACV).

[17]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[18]  Xingyuan Wang,et al.  High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding , 2021, IEEE Signal Processing Letters.

[19]  Richard Zhang,et al.  Making Convolutional Networks Shift-Invariant Again , 2019, ICML.

[20]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[21]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[22]  Xiaoyu Wang,et al.  An encrypted coverless information hiding method based on generative models , 2021, Inf. Sci..

[23]  Yang Yu,et al.  Unsupervised Representation Learning with Deep Convolutional Neural Network for Remote Sensing Images , 2017, ICIG.

[24]  Kai Liu,et al.  Steganalysis Based on Awareness of Selection-Channel and Deep Learning , 2017, IWDW.

[25]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[26]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[27]  Chandan Singh,et al.  Accuracy and numerical stability of high-order polar harmonic transforms , 2012 .

[28]  Xingming Sun,et al.  Coverless Information Hiding Based on the Molecular Structure Images of Material , 2018 .

[29]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[30]  Leon A. Gatys,et al.  A Neural Algorithm of Artistic Style , 2015, ArXiv.

[31]  Chengsheng Yuan,et al.  A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography , 2019, Journal of Information Hiding and Privacy Protection.