Deep learning for real-time image steganalysis: a survey
暂无分享,去创建一个
Feng Ruan | Shaohua Wan | Lianyong Qi | Zhanyang Xu | Xing Zhang | Dawei Zhu | Lianyong Qi | Zhanyang Xu | Feng Ruan | Xing Zhang | Shaohua Wan | Dawei Zhu
[1] Wang Yun,et al. Research on an information hiding algorithm base on most significant bit in image , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[2] Jianming Fu,et al. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram , 2019, ArXiv.
[3] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[4] R.T. McKeon,et al. Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[5] Xuyun Zhang,et al. EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment , 2016, IEEE Transactions on Cloud Computing.
[6] Mansour Sheikhan,et al. Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis , 2016 .
[7] Jie Zhang,et al. Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.
[8] S. El-Rabaie,et al. High security data hiding using image cropping and LSB least significant bit steganography , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[9] Bin Li,et al. ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.
[10] Hui Li,et al. Steganalysis Using Unsupervised End-to-End CNN Fused with Residual Image , 2018, 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI).
[11] Tao Huang,et al. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks , 2019, J. Netw. Comput. Appl..
[12] Larry S. Davis,et al. Deep Residual Learning in the JPEG Transform Domain , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).
[13] Fu Bing,et al. Information hiding technique in most significant bit of still image , 2009, 2009 International Conference on Image Analysis and Signal Processing.
[14] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[15] Xuyun Zhang,et al. BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.
[16] Xingming Sun,et al. Dynamic Resource Allocation for Load Balancing in Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[17] Xianfeng Zhao,et al. Highly accurate real-time image steganalysis based on GPU , 2016, Journal of Real-Time Image Processing.
[18] Arun Kumar Sangaiah,et al. Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..
[19] S. Han,et al. Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[20] Xingming Sun,et al. Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.
[21] Zhili Zhou,et al. Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search , 2019, IEEE Transactions on Big Data.
[22] Shancang Li,et al. A Heuristic Offloading Method for Deep Learning Edge Services in 5G Networks , 2019, IEEE Access.
[23] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[24] Xiaoou Tang,et al. Accelerating the Super-Resolution Convolutional Neural Network , 2016, ECCV.
[25] Dongdong Hou,et al. Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[26] Hedieh Sajedi,et al. Region based Image Steganalysis using Artificial Bee Colony , 2017, J. Vis. Commun. Image Represent..
[27] Qiang He,et al. An IoT-Oriented data placement method with privacy preservation in cloud environment , 2018, J. Netw. Comput. Appl..
[28] Xingming Sun,et al. Encoding multiple contextual clues for partial-duplicate image retrieval , 2017, Pattern Recognit. Lett..
[29] Lie-Hui Jiang,et al. A review on deep learning based image steganalysis , 2018, 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[30] J. Anita Christaline,et al. Bio-Inspired Computational Algorithms for Improved Image Steganalysis , 2016 .
[31] Rainer Poisel,et al. Software architecture for real-time steganography in auditive media , 2010, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON).
[32] Somjit Arch-int,et al. An adaptive multi bit-plane image steganography using block data-hiding , 2016, Multimedia Tools and Applications.
[33] Igor Carron,et al. XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks , 2016 .
[34] Tao Huang,et al. Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing , 2019, Multimedia Tools and Applications.
[35] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[36] Mansour Sheikhan,et al. Synthesizing suprasegmental speech information using hybrid of GA-ACO and dynamic neural network , 2013, The 5th Conference on Information and Knowledge Technology.
[37] Ki-Hyun Jung,et al. Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.
[38] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[39] Ping Zhong,et al. Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine , 2019, Int. J. Digit. Crime Forensics.
[40] Latika Singh,et al. An improved dynamic discrete firefly algorithm for blind image steganalysis , 2018, Int. J. Mach. Learn. Cybern..
[41] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[42] Jing Dong,et al. Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).
[43] Q. M. Jonathan Wu,et al. Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.
[44] Abdulaleem Z. Al-Othmani,et al. A survey on steganography techniques in real time audio signals and evaluation , 2012 .
[45] Yambem Jina Chanu,et al. A short survey on image steganography and steganalysis techniques , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[46] Yaojie Lu,et al. Shallow Convolutional Neural Network for Implicit Discourse Relation Recognition , 2015, EMNLP.
[47] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[48] Aakaash Jois,et al. Survey on LSB Data hiding techniques , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[49] Wanchun Dou,et al. Multiobjective computation offloading for workflow management in cloudlet‐based mobile cloud using NSGA‐II , 2018, Comput. Intell..
[50] Andrew D. Ker,et al. The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.
[51] Jing Dong,et al. Feature learning for steganalysis using convolutional neural networks , 2017, Multimedia Tools and Applications.
[52] Jiangqun Ni,et al. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy , 2018, IEEE Signal Processing Letters.
[53] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[54] Slawomir Grzonkowski,et al. Enabling Trust in Deep Learning Models: A Digital Forensics Case Study , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[55] Marc Chaumont,et al. Color Image Steganalysis Based On Steerable Gaussian Filters Bank , 2016, IH&MMSec.
[56] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[57] Xian-Ting Zeng,et al. Lossless Data Hiding Scheme Based on Adjacent Pixel Difference , 2009, 2009 International Conference on Computer Engineering and Technology.
[58] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[59] Yan Liu,et al. Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.
[60] Chang-Tsun Li,et al. A Multi-Task Learning CNN for Image Steganalysis , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).
[61] Qi Ke,et al. Image Steganalysis via Multi-Column Convolutional Neural Network , 2018, 2018 14th IEEE International Conference on Signal Processing (ICSP).
[62] Qun Li,et al. A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.
[63] Jiri Fridrich,et al. Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[64] Xuyun Zhang,et al. A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..
[65] Tong Li,et al. Development of Private Processes: A Refinement Approach , 2019, IEEE Access.
[66] Xinpeng Zhang,et al. Selective Ensemble Classification of Image Steganalysis Via Deep Q Network , 2019, IEEE Signal Processing Letters.
[67] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[68] Xuyun Zhang,et al. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.
[69] Tao Zhang,et al. Deep neural networks for efficient steganographic payload location , 2019, Journal of Real-Time Image Processing.
[70] B. Luo,et al. A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[71] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[72] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[73] Chuan Qin,et al. Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.
[74] Xingming Sun,et al. Coverless Image Steganography Without Embedding , 2015, ICCCS.
[75] Xuyun Zhang,et al. A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems , 2017, Future Gener. Comput. Syst..
[76] Jie Zhang,et al. A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment , 2019, IEEE Transactions on Computational Social Systems.
[77] Xuyun Zhang,et al. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..
[78] Tao Huang,et al. Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks , 2018, Secur. Commun. Networks.
[79] Xiangyang Luo,et al. Attack on Deep Steganalysis Neural Networks , 2018, ICCCS.
[80] Leon A. Gatys,et al. Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[81] Xihua Liu,et al. Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks , 2020, Mob. Networks Appl..
[82] N. Sruthi Das,et al. Large-scale steganalysis using outlier detection method for image sharing application , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].
[83] Amritpal Singh,et al. An improved LSB based image steganography technique for RGB images , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[84] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[85] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[86] Yan Liu,et al. A Novel Convolutional Neural Network for Image Steganalysis With Shared Normalization , 2017, IEEE Transactions on Multimedia.
[87] Qiang He,et al. Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..
[88] Qun Li,et al. Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[89] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.