StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module
暂无分享,去创建一个
Chuan Qin | Xintao Duan | Dongli Yue | Zimei Xie | Wenxin Wang | Nao Liu | Chuan Qin | X. Duan | Zimei Xie | Wenxin Wang | Dongli Yue | Nao Liu
[1] Jin Wang,et al. A Fast Q-Learning Based Data Storage Optimization for Low Latency in Data Center Networks , 2020, IEEE Access.
[2] Kai Liu,et al. Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.
[3] Rafia Rahim,et al. End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.
[4] Jing Wang,et al. CAPTCHA recognition based on deep convolutional neural network. , 2019, Mathematical biosciences and engineering : MBE.
[5] Benedikt Boehm,et al. StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.
[6] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[7] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[8] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..
[9] Djemel Ziou,et al. Image Quality Metrics: PSNR vs. SSIM , 2010, 2010 20th International Conference on Pattern Recognition.
[10] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[11] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[13] Naixue Xiong,et al. An Industrial Dynamic Skyline Based Similarity Joins For Multidimensional Big Data Applications , 2020, IEEE Transactions on Industrial Informatics.
[14] Antonio Torralba,et al. Nonparametric Scene Parsing via Label Transfer , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[16] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[17] Kuo-Chen Wu,et al. Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.
[18] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[19] Xuyu Xiang,et al. Coverless real-time image information hiding based on image block matching and dense convolutional network , 2019, Journal of Real-Time Image Processing.
[20] Cordelia Schmid,et al. Beyond Bags of Features: Spatial Pyramid Matching for Recognizing Natural Scene Categories , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[21] Trevor Darrell,et al. Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Nasir D. Memon,et al. On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.
[23] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[24] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[25] Qian Zhang,et al. The image annotation algorithm using convolutional features from intermediate layer of deep learning , 2020, Multimedia Tools and Applications.
[26] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.
[27] Lorenzo Bruzzone,et al. Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity , 2017, IEEE Transactions on Geoscience and Remote Sensing.
[28] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[29] Minqing Zhang,et al. Generative Steganography by Sampling , 2018, IEEE Access.
[30] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[31] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[32] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[33] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[34] Xiaogang Wang,et al. Pyramid Scene Parsing Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] Bolei Zhou,et al. Object Detectors Emerge in Deep Scene CNNs , 2014, ICLR.