A Survey on Digital Image Steganography
暂无分享,去创建一个
Jiaxin Wang | Beijing Chen | Peng Wu | Mengxin Cheng | Beijing Chen | Peng Wu | Jiaxin Wang | Mengxing Cheng
[1] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[2] Naser Ebrahimian,et al. A New Method for Color Image Steganography Using SPIHT and DFT, Sending with JPEG Format , 2009, 2009 International Conference on Computer Technology and Development.
[3] Francisco Madeiro,et al. Word-Hunt: A LSB Steganography Method with Low Expected Number of Modifications per Pixel , 2016, IEEE Latin America Transactions.
[4] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[5] Wang Zhi-quan. High Capacity Information Hiding Scheme for JPEG Images , 2007 .
[6] Ali N. Akansu,et al. A robust data hiding scheme for images using DFT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[7] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[8] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[9] C.-C. Jay Kuo,et al. Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..
[10] Richa Gupta,et al. Importance and Techniques of Information Hiding : A Review , 2014, ArXiv.
[11] A.A. Abdelwahab,et al. A discrete wavelet transform based technique for image data hiding , 2008, 2008 National Radio Science Conference.
[12] Lei Xu,et al. SteganoGAN: High Capacity Image Steganography with GANs , 2019, ArXiv.
[13] Kai Liu,et al. Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.
[14] Wen-Nung Lie,et al. Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[15] Rafia Rahim,et al. End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.
[16] Liang Zhang,et al. A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.
[17] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[18] Robert M. Hierons,et al. High Capacity Steganographic Method Based Upon JPEG , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[19] N. Vongurai,et al. Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform , 2012, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation.
[20] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[21] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[22] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[23] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[24] Mohammad Ali Akhaee,et al. One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..
[25] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[26] Wen-Yuan Chen,et al. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..
[27] T. Shahara Banu,et al. Secure reversible data hiding technique on textures using double encryption , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[28] Jianyi Liu,et al. Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.
[29] Francisco J. Gallegos Funes,et al. Color local complexity estimation based steganographic (CLCES) method , 2013, Expert Syst. Appl..
[30] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[31] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[32] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[33] Edward Rivas. Fourier phase domain steganography: phase bin encoding via interpolation , 2007, SPIE Defense + Commercial Sensing.
[34] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[35] H. B. Kekre,et al. Increased cover capacity using advanced multiple LSB algorithms , 2011, ICWET.