A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network
暂无分享,去创建一个
Chuan Qin | Xintao Duan | Baoxia Li | Daidou Guo | Mengxiao Gou | Nao Liu | Chuan Qin | X. Duan | Baoxia Li | Daidou Guo | Mengxiao Gou | Nao Liu
[1] Yazan Aljeroudi,et al. Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.
[2] Benedikt Boehm,et al. StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.
[3] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[4] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[5] Francis M. Boland,et al. Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[6] Donghui Hu,et al. Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.
[7] Gandharba Swain,et al. Pixel Overlapping Image Steganography Using PVD and Modulus Function , 2018, 3D Research.
[8] Cheng-Chi Lee,et al. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System , 2017, Sensors.
[9] Gandharba Swain,et al. Dual Stego-imaging Based Reversible Data Hiding Using Improved LSB Matching , 2019, International Journal of Intelligent Engineering and Systems.
[10] Feng-Hsiag Hsiao,et al. Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach , 2017, Int. J. Syst. Sci..
[11] Xiaogang Jin,et al. Hidden message in a deformation-based texture , 2014, The Visual Computer.
[12] Yuqi Fan,et al. Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks , 2017, Secur. Commun. Networks.
[13] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[14] Xue Ouyang,et al. An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems , 2019, IEEE Access.
[15] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[16] Kuo-Chen Wu,et al. Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.
[17] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[18] Khumanthem Manglem Singh,et al. Image Encryption using Elliptic Curve Cryptography , 2015 .
[19] Chin-Chen Chang,et al. Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..
[20] Jiwu Huang,et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.
[21] Roberto Cipolla,et al. SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Yoshua Bengio,et al. Generative Adversarial Networks , 2014, ArXiv.
[23] Pingzhi Fan,et al. An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.
[24] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[25] Rafia Rahim,et al. End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.
[26] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[27] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[28] Xuesong Wang,et al. Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem , 2018, IEEE Access.
[29] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[30] Chin-Chen Chang,et al. A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..
[31] Jianyi Liu,et al. Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.
[32] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[33] Ruohan Meng. A fusion steganographic algorithm based on Faster R-CNN , 2018 .
[34] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[35] Erkki Oja,et al. PicSOM - content-based image retrieval with self-organizing maps , 2000, Pattern Recognit. Lett..
[36] Manisha Rana,et al. A Comparative Study of Public Key Cryptosystem based on ECC and RSA , 2011 .
[37] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[38] Chuan Qin,et al. Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.
[39] Xingming Sun,et al. Coverless Image Steganography Without Embedding , 2015, ICCCS.
[40] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[41] Moad Yassin Mowafi,et al. Use of elliptic curve cryptography for multimedia encryption , 2013, IET Inf. Secur..
[42] Wu-Lin Chen,et al. A novel tamper detection scheme for BTC-compressed images , 2013 .