On Security Enhancement of Steganography via Generative Adversarial Image
暂无分享,去创建一个
Guorui Feng | Xinpeng Zhang | Liquan Shen | Lingchen Zhou | Liquan Shen | Xinpeng Zhang | Guorui Feng | Lingchen Zhou
[1] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[2] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Xinpeng Zhang,et al. Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.
[4] Trevor Darrell,et al. Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.
[6] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[7] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[8] Jia Liu,et al. Steganography Security: Principle and Practice , 2018, IEEE Access.
[9] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[10] Parham Aarabi,et al. Adversarial Attacks on Face Detectors Using Neural Net Based Constrained Optimization , 2018, 2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP).
[11] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[12] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[13] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[14] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[15] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[16] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[17] Aparajita Khan,et al. A Robust Image Steganography in , 2015 .
[18] Xianfeng Zhao,et al. Weakening the Detecting Capability of CNN-based Steganalysis , 2018, ArXiv.
[19] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[20] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[21] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[22] Peng Li,et al. Active semi-supervised learning based on self-expressive correlation with generative adversarial networks , 2019, Neurocomputing.
[23] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[24] Zhenxing Qian,et al. Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[25] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[26] Bin Li,et al. CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography , 2018, ArXiv.
[27] Jianhua Yang,et al. Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).