High-Capacity Convolutional Video Steganography with Temporal Residual Modeling
暂无分享,去创建一个
Yadong Mu | Xinyu Weng | Yongzhi Li | Lu Chi | Yadong Mu | Lu Chi | Yongzhi Li | Xinyu Weng
[1] Laiha Binti Mat Kiah,et al. High Rate Video Streaming Steganography , 2009, 2009 International Conference on Information Management and Engineering.
[2] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[3] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[4] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[6] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[7] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[8] Lorenzo Torresani,et al. C3D: Generic Features for Video Analysis , 2014, ArXiv.
[9] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[10] E. V. Prasad,et al. STEGANOGRAPHY USING BPCS TO THE INTEGER WAVELET TRANSFORMED IMAGE , 2007 .
[11] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[12] Amal Said Khalifa,et al. Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.
[13] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[14] B. S. Manjunath,et al. Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[15] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[16] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Gandharba Swain,et al. Digital Image Steganography Using Eight-Directional PVD against RS Analysis and PDH Analysis , 2018, Adv. Multim..
[19] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[20] Amandeep Kaur,et al. STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN , 2011 .
[21] Sushanta Biswas,et al. A novel technique for image steganography based on Block-DCT and Huffman Encoding , 2010, ArXiv.
[22] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[23] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[24] Reza Safabakhsh,et al. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods , 2017, ArXiv.
[25] Eiji Kawaguchi,et al. Principles and applications of BPCS steganography , 1999, Other Conferences.
[26] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[27] Chet Hosmer,et al. An Overview of Steganography , 2011, Adv. Comput..
[28] Omaima N. A. AL-Allaf,et al. Hiding an Image inside another Image using Variable-Rate Steganography , 2013 .
[29] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[30] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[31] Adnan Abdul-Aziz Gutub,et al. RGB Intensity Based Variable-Bits Image Steganography , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[32] Md. Ismail Hossain,et al. A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).
[33] Liang Yang,et al. Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System , 2018, Int. J. Digit. Crime Forensics.
[34] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[35] Sahar A. El-Rahman,et al. A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information , 2016, Comput. Electr. Eng..
[36] Iasonas Kokkinos,et al. DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[38] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[39] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[40] Alan C. Bovik,et al. Image information and visual quality , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[41] Alan C. Bovik,et al. Image information and visual quality , 2006, IEEE Trans. Image Process..
[42] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[43] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[44] David Megías,et al. Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..
[45] Phalguni Gupta,et al. Edge-based image steganography , 2014, EURASIP J. Inf. Secur..
[46] Haitham Badi,et al. Artificial neural network for steganography , 2014, Neural Computing and Applications.
[47] Hideki Noda,et al. BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..
[48] Jascha Sohl-Dickstein,et al. Adversarial Examples that Fool both Human and Computer Vision , 2018, ArXiv.
[49] Min Long,et al. A Formula Adaptive Pixel Pair Matching Steganography Algorithm , 2018, Adv. Multim..
[50] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[51] Jessica J. Fridrich,et al. Digital image steganography using stochastic modulation , 2003, IS&T/SPIE Electronic Imaging.
[52] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.