Deep Residual Neural Networks for Image in Audio Steganography (Workshop Paper)
暂无分享,去创建一个
[1] Ramit Sawhney,et al. #YouToo? Detection of Personal Recollections of Sexual Harassment on Social Media , 2019, ACL.
[2] Fatiha Djebbar,et al. Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..
[3] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[4] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[5] Ramit Sawhney,et al. SNAP-BATNET: Cascading Author Profiling and Social Network Graphs for Suicide Ideation Detection on Social Media , 2019, NAACL.
[6] Martín Abadi,et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.
[7] Yann Dauphin,et al. Language Modeling with Gated Convolutional Networks , 2016, ICML.
[8] Ramit Sawhney,et al. Crisis-DIAS: Towards Multimodal Damage Analysis - Deployment, Challenges and Assessment , 2020, AAAI.
[9] Dr. med. Rajiv Shah,et al. Multimodal Analysis of User-Generated Multimedia Content , 2017, Socio-Affective Computing.
[10] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Ravi Shankar,et al. A Comparative Study of Transfer Functions in Binary Evolutionary Algorithms for Single Objective Optimization , 2018, DCAI.
[12] Bhiksha Raj,et al. Hide and Speak: Towards Deep Neural Networks for Speech Steganography , 2019, INTERSPEECH.
[13] Stephen Marshall,et al. Activation Functions: Comparison of trends in Practice and Research for Deep Learning , 2018, ArXiv.
[14] Ramit Sawhney,et al. Speak up, Fight Back! Detection of Social Media Disclosures of Sexual Harassment , 2019, NAACL.
[15] Abien Fred Agarap. Deep Learning using Rectified Linear Units (ReLU) , 2018, ArXiv.
[16] Puneet Mathur,et al. #MeTooMA: Multi-Aspect Annotations of Tweets Related to the MeToo Movement , 2020, ICWSM.
[17] Omaima N. A. AL-Allaf,et al. Hiding an Image inside another Image using Variable-Rate Steganography , 2013 .
[18] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[19] Jiwu Huang,et al. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.
[20] Roger Zimmermann,et al. Multimodal Multi-Task Financial Risk Forecasting , 2020, ACM Multimedia.
[21] Ramit Sawhney,et al. #suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter , 2019, CIKM.
[22] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[23] Jonathan G. Fiscus,et al. DARPA TIMIT:: acoustic-phonetic continuous speech corpus CD-ROM, NIST speech disc 1-1.1 , 1993 .
[24] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.