Steganographic generative adversarial networks
暂无分享,去创建一个
Evgeny Burnaev | Denis Volkhonskiy | Ivan Nazarov | Boris Borisenko | Evgeny Burnaev | Denis Volkhonskiy | I. Nazarov | B. Borisenko
[1] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[2] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[3] Dakshina Ranjan Kisku,et al. Data Hiding in Images Using Some Efficient Steganography Techniques , 2011, FGIT-SIP.
[4] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[5] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] A. Krizhevsky. Convolutional Deep Belief Networks on CIFAR-10 , 2010 .
[7] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[8] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[9] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[10] Sebastian Nowozin,et al. f-GAN: Training Generative Neural Samplers using Variational Divergence Minimization , 2016, NIPS.
[11] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[12] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[13] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[14] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[15] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[16] Ian J. Goodfellow,et al. NIPS 2016 Tutorial: Generative Adversarial Networks , 2016, ArXiv.
[17] Sepp Hochreiter,et al. GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium , 2017, NIPS.
[18] Eric P. Xing,et al. On Unifying Deep Generative Models , 2017, ICLR.
[19] François Laviolette,et al. Domain-Adversarial Training of Neural Networks , 2015, J. Mach. Learn. Res..
[20] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[21] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[22] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[23] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[24] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[25] Max Welling,et al. Auto-Encoding Variational Bayes , 2013, ICLR.
[26] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[27] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[28] Max Welling,et al. Semi-supervised Learning with Deep Generative Models , 2014, NIPS.
[29] Bernt Schiele,et al. Generative Adversarial Text to Image Synthesis , 2016, ICML.
[30] Sridhar Mahadevan,et al. Generative Multi-Adversarial Networks , 2016, ICLR.