暂无分享,去创建一个
[1] Jianyi Liu,et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.
[2] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[3] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[4] Jessica J. Fridrich,et al. On completeness of feature spaces in blind steganalysis , 2008, MM&Sec '08.
[5] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Xiang Lin,et al. Steganalysis of Adaptive JPEG Steganography Based on ResDet , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[7] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[8] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[9] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[10] Dennis Shasha,et al. SafePredict: A Meta-Algorithm for Machine Learning That Uses Refusals to Guarantee Correctness , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Jessica J. Fridrich,et al. Breaking HUGO - The Process Discovery , 2011, Information Hiding.
[12] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[13] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[14] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[15] Jessica J. Fridrich,et al. Quantitative steganalysis using rich models , 2013, Electronic Imaging.
[16] Jiangqun Ni,et al. Improved Uniform Embedding for Efficient JPEG Steganography , 2016, ICCCS.
[17] Jingwen Yan,et al. A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis , 2019, IH&MMSec.
[18] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[19] Patrick Bas,et al. Steganalysis into the Wild: How to Define a Source? , 2018, Media Watermarking, Security, and Forensics.
[20] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[21] Jessica J. Fridrich,et al. Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.
[22] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[23] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[24] Yi Ma,et al. Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.
[25] Kejiang Chen,et al. Defining Joint Distortion for JPEG Steganography , 2018, IH&MMSec.
[26] Jessica J. Fridrich,et al. Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis , 2017, Media Watermarking, Security, and Forensics.
[27] Marc Chaumont,et al. Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features , 2012, 2012 19th IEEE International Conference on Image Processing.
[28] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[29] Jessica Fridrich,et al. Detection of Diversified Stego Sources with CNNs , 2019, Media Watermarking, Security, and Forensics.
[30] Jessica J. Fridrich,et al. Theoretical model of the FLD ensemble classifier based on hypothesis testing theory , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[31] Guanshuo Xu,et al. Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.
[32] Marc Chaumont,et al. Color Image Steganalysis Based On Steerable Gaussian Filters Bank , 2016, IH&MMSec.
[33] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[34] Jiwu Huang,et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.
[35] Mo Chen,et al. JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.
[36] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.
[37] Bolin Chen,et al. Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.
[38] Jessica J. Fridrich,et al. Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[39] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[40] Marc Chaumont,et al. Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[41] Andrew D. Ker,et al. Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.
[42] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[43] Pedro Comesaña Alfaro,et al. Improving Selection-Channel-Aware Steganalysis Features , 2016, Media Watermarking, Security, and Forensics.
[44] Mo Chen,et al. Deep Learning Regressors for Quantitative Steganalysis , 2018, Media Watermarking, Security, and Forensics.
[45] Marc Chaumont,et al. Pooled Steganalysis in JPEG: how to deal with the spreading strategy? , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).
[46] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[47] Jessica J. Fridrich,et al. Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.
[48] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[49] Jessica J. Fridrich,et al. Optimizing pixel predictors for steganalysis , 2012, Other Conferences.
[50] Xiaofeng Li,et al. Generalized transfer component analysis for mismatched JPEG steganalysis , 2013, 2013 IEEE International Conference on Image Processing.
[51] A. Soliman,et al. Author Biography , 2018, Understanding Language Use in the Classroom.
[52] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[53] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[54] Marc Chaumont,et al. Quantitative and Binary Steganalysis in JPEG: A Comparative Study , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[55] Bin Li,et al. Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis , 2017, Media Watermarking, Security, and Forensics.
[56] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[57] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[58] Zhitao Gong,et al. Strike (With) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[59] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[60] Yang Yang,et al. Deep Learning Scaling is Predictable, Empirically , 2017, ArXiv.
[61] Jianhua Yang,et al. Towards Automatic Embedding Cost Learning for JPEG Steganography , 2019, IH&MMSec.
[62] Mauro Barni,et al. A Comparative Study of ±1 Steganalyzers , 2008 .
[63] Yun Q. Shi,et al. Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.
[64] Tomás Pevný. Co-occurrence steganalysis in high dimensions , 2012, Other Conferences.
[65] Dirk Borghys,et al. Facing the Cover-Source Mismatch on JPHide using Training-Set Design , 2018, IH&MMSec.
[66] David Megías,et al. Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..
[67] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[68] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[69] Quoc V. Le,et al. Efficient Neural Architecture Search via Parameter Sharing , 2018, ICML.
[70] Stéphane Mallat,et al. Understanding deep convolutional networks , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[71] Bin Li,et al. ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.
[72] Jianhua Yang,et al. An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.
[73] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[74] Jessica J. Fridrich,et al. Effect of Imprecise Knowledge of the Selection Channel on Steganalysis , 2015, IH&MMSec.
[75] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[76] Marc Chaumont,et al. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[77] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[78] Jing Dong,et al. Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[79] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[80] Belhassen Bayar,et al. A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.
[81] Ming Li,et al. Contribution-based feature transfer for JPEG mismatched steganalysis , 2017, 2017 IEEE International Conference on Image Processing (ICIP).
[82] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[83] Andrew D. Ker,et al. Going from small to large data in steganalysis , 2012, Other Conferences.
[84] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[85] Li Fei-Fei,et al. Progressive Neural Architecture Search , 2017, ECCV.
[86] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[87] Marc Chaumont,et al. Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[88] Dong-Ming Yan,et al. Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks , 2018, IEEE Transactions on Information Forensics and Security.
[89] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[90] Marc Chaumont,et al. Steganography using a 3 player game , 2019, J. Vis. Commun. Image Represent..
[91] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[92] Jessica J. Fridrich,et al. Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.
[93] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[94] Tsuyoshi Murata,et al. {m , 1934, ACML.
[95] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[96] Ming Li,et al. Iterative multi-order feature alignment for JPEG mismatched steganalysis , 2016, Neurocomputing.
[97] Jessica J. Fridrich,et al. Nonlinear Feature Normalization in Steganalysis , 2017, IH&MMSec.
[98] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[99] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[100] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[101] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[102] Marc Chaumont,et al. How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.
[103] Rainer Böhme,et al. A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.
[104] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.
[105] Marc Chaumont,et al. Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[106] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[107] Patrick Bas,et al. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis , 2019, IH&MMSec.
[108] Simmons,et al. The Subliminal Channel and Digital Signatures , 2022 .
[109] François Chollet,et al. Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[110] Vladimir Iglovikov,et al. Camera Model Identification Using Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).
[111] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[112] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[113] Tomás Pevný,et al. The challenges of rich features in universal steganalysis , 2013, Electronic Imaging.
[114] Martín Abadi,et al. Learning to Protect Communications with Adversarial Neural Cryptography , 2016, ArXiv.
[115] John Klein,et al. Exploiting Adversarial Embeddings for Better Steganography , 2019, IH&MMSec.
[116] Rainer Böhme,et al. Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[117] Jian Sun,et al. Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.