Adversarial Learning for Invertible Steganography
暂无分享,去创建一个
[1] Jia Liu,et al. Steganography Security: Principle and Practice , 2018, IEEE Access.
[2] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[3] Narendra Ahuja,et al. Deep Laplacian Pyramid Networks for Fast and Accurate Super-Resolution , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[5] Ioan-Catalin Dragoi,et al. Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.
[6] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[7] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[8] Bin Li,et al. General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.
[9] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[10] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[11] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Glen G. Langdon,et al. An Introduction to Arithmetic Coding , 1984, IBM J. Res. Dev..
[13] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[14] Taghi M. Khoshgoftaar,et al. A survey on Image Data Augmentation for Deep Learning , 2019, Journal of Big Data.
[15] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[16] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[17] Chang-Tsun Li,et al. Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues , 2019, IEEE Access.
[18] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[19] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[20] Jeho Nam,et al. Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Ton Kalker,et al. The VIVA project: digital watermarking for broadcast monitoring , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[22] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[23] Guorui Feng,et al. On Security Enhancement of Steganography via Generative Adversarial Image , 2020, IEEE Signal Processing Letters.
[24] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[25] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[26] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[27] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[28] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[29] Jiwu Huang,et al. New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.
[30] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[31] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[32] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[33] A. Murat Tekalp,et al. Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.
[34] Charu C. Aggarwal,et al. On the Surprising Behavior of Distance Metrics in High Dimensional Spaces , 2001, ICDT.
[35] C. Duchon. Lanczos Filtering in One and Two Dimensions , 1979 .
[36] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[37] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Weiming Zhang,et al. Reversible Data Hiding Under Inconsistent Distortion Metrics , 2018, IEEE Transactions on Image Processing.
[39] Minqing Zhang,et al. Recent Advances of Image Steganography With Generative Adversarial Networks , 2019, IEEE Access.
[40] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[41] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[42] Xin Chen,et al. Multiple Histograms-Based Reversible Data Hiding: Framework and Realization , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[43] Ingemar J. Cox,et al. Watermarking as communications with side information , 1999, Proc. IEEE.
[44] Jessica J. Fridrich,et al. Distortion-Free Data Embedding for Images , 2001, Information Hiding.
[45] Christian Ledig,et al. Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[46] Ton Kalker,et al. Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.
[47] Bin Ma,et al. A Reversible Data Hiding Scheme Based on Code Division Multiplexing , 2016, IEEE Transactions on Information Forensics and Security.
[48] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[49] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[50] Dinu Coltuc,et al. Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.
[51] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[52] Nora Cuppens-Boulahia,et al. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.
[53] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[54] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[55] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[56] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.
[57] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[58] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[59] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[60] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[61] Raymond Y. K. Lau,et al. Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[62] Jianhua Yang,et al. An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.
[63] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[64] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[65] Andrea Vedaldi,et al. Deep Image Prior , 2017, International Journal of Computer Vision.
[66] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[67] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[68] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[69] Weiming Zhang,et al. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers , 2012, IEEE Transactions on Image Processing.
[70] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[71] Xiaoou Tang,et al. Image Super-Resolution Using Deep Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[72] Wen Gao,et al. Deep Reconstruction of Least Significant Bits for Bit-Depth Expansion , 2019, IEEE Transactions on Image Processing.
[73] Lei Zhang,et al. Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.
[74] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[75] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[76] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[77] Chang-Tsun Li,et al. Privacy-Aware Reversible Watermarking in Cloud Computing Environments , 2018, IEEE Access.
[78] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.