GAN-TStega: Text Steganography Based on Generative Adversarial Networks
暂无分享,去创建一个
Yongfeng Huang | Zhongliang Yang | Qinghe Liu | Nan Wei | Yujin Zhang | Yongfeng Huang | Zhongliang Yang | Nan Wei | Yujin Zhang | Qinghe Liu
[1] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[2] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[3] Yongfeng Huang,et al. TS-RNN: Text Steganalysis Based on Recurrent Neural Networks , 2019, IEEE Signal Processing Letters.
[4] Yongfeng Huang,et al. A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.
[5] Krista Bennett,et al. LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .
[6] Bin Deng,et al. BinText steganography based on Markov state transferring probability , 2009, ICIS.
[7] Yongfeng Huang,et al. Image Captioning with Object Detection and Localization , 2017, ICIG.
[8] Samy Bengio,et al. Scheduled Sampling for Sequence Prediction with Recurrent Neural Networks , 2015, NIPS.
[9] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[10] Xingming Sun,et al. Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.
[11] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[12] Yong Yu,et al. Long Text Generation via Adversarial Training with Leaked Information , 2017, AAAI.
[13] Yongfeng Huang,et al. RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model , 2018, ICCCS.
[14] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[15] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[16] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[17] Bin Deng,et al. Text Steganography System Using Markov Chain Source Model and DES Algorithm , 2010, J. Softw..
[18] Yong-Feng Huang,et al. RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.
[19] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[20] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[21] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[22] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[23] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.