暂无分享,去创建一个
Bin Li | Mauro Barni | Jiwu Huang | Shunquan Tan | Weixuan Tang | M. Barni | Jiwu Huang | Shunquan Tan | Bin Li | Weixuan Tang
[1] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[2] Bin Li,et al. Large-scale JPEG steganalysis using hybrid deep-learning framework , 2016, ArXiv.
[3] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[4] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[5] Jessica J. Fridrich,et al. Natural Steganography in JPEG Compressed Images , 2018, Media Watermarking, Security, and Forensics.
[6] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[7] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[8] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[9] Tomás Pevný,et al. Benchmarking for Steganography , 2008, Information Hiding.
[10] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[11] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[12] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[13] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[14] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[15] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[16] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[17] Bin Li,et al. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.
[18] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[19] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[22] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[23] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[24] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[26] Mauro Barni,et al. The Source Identification Game: An Information-Theoretic Perspective , 2013, IEEE Transactions on Information Forensics and Security.
[27] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[28] Weiming Zhang,et al. A New Rule for Cost Reassignment in Adaptive Steganography , 2017, IEEE Transactions on Information Forensics and Security.
[29] Guanshuo Xu,et al. Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.
[30] Yao Zhao,et al. A gradient-based pixel-domain attack against SVM detection of global image manipulations , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).
[31] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[32] Jessica J. Fridrich,et al. Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.
[33] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[34] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[35] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[36] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[37] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[38] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[39] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.