Coverless Image Steganography: A Survey
暂无分享,去创建一个
Xuyu Xiang | Jiaohua Qin | Yuanjing Luo | Huajun Huang | Yun Tan | Huajun Huang | Jiaohua Qin | Xuyu Xiang | Yun Tan | Yuanjing Luo
[1] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[2] Jing Long,et al. A New Robust Dual Intellectual Property Watermarking Algorithm Based on Field Programmable Gate Array , 2015 .
[3] Xuyu Xiang,et al. A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding , 2019, IEEE Access.
[4] Donghui Hu,et al. Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.
[5] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[6] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[7] Xingming Sun,et al. Encoding multiple contextual clues for partial-duplicate image retrieval , 2017, Pattern Recognit. Lett..
[8] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[9] Peyman Ayubi,et al. An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..
[10] R.T. McKeon,et al. Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[11] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[12] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[13] Min Gao,et al. A novel coverless information hiding method based on the average pixel value of the sub-images , 2018, Multimedia Tools and Applications.
[14] Yi Long,et al. Coverless Information Hiding Method Based on Web Text , 2019, IEEE Access.
[15] Chong-Wah Ngo,et al. Evaluating bag-of-visual-words representations in scene classification , 2007, MIR '07.
[16] Peyman Ayubi,et al. A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..
[17] Mo Chen,et al. JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.
[18] Fei Peng,et al. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.
[19] M. C. Hanumantharaju,et al. Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography , 2019, Multimedia Tools and Applications.
[20] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[21] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[22] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[23] Xintao Duan,et al. Coverless information hiding based on Generative Model , 2018, ArXiv.
[24] Jia Liu,et al. Coverless Information Hiding Based on Generative adversarial networks , 2017, ArXiv.
[25] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[26] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[27] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[28] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[29] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[30] Wen-Yuan Chen,et al. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..
[31] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[32] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[33] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[34] Léon Bottou,et al. Wasserstein GAN , 2017, ArXiv.
[35] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[36] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[37] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[38] Xingming Sun,et al. Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm , 2017 .
[39] Xuyu Xiang,et al. Coverless real-time image information hiding based on image block matching and dense convolutional network , 2019, Journal of Real-Time Image Processing.
[40] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[41] Xingming Sun,et al. Coverless Image Steganography Without Embedding , 2015, ICCCS.
[42] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[43] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[44] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[45] Wang Shuo. Recent Advances in Image-Based Steganalysis Research , 2009 .
[46] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[47] Sanaa Ghouzali,et al. Zero-steganography using DCT and spatial domain , 2013, 2013 ACS International Conference on Computer Systems and Applications (AICCSA).