暂无分享,去创建一个
Yongfeng Huang | Yu-Jin Zhang | Zhongliang Yang | Xingjian Du | Yilin Tan | Yongfeng Huang | Zhongliang Yang | Yujin Zhang | Yilin Tan | Xingjian Du
[1] Bob L. Sturm,et al. Music transcription modelling and composition using deep learning , 2016, ArXiv.
[2] Tsuyoshi Murata,et al. {m , 1934, ACML.
[3] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[4] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[5] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[6] Hamzeh Ghasemzadeh,et al. Toward a robust and secure echo steganography method based on parameters hopping , 2015, 2015 Signal Processing and Intelligent Systems Conference (SPIS).
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Yongfeng Huang,et al. A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.
[9] Rajesh Kumar,et al. Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.
[10] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[11] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[12] R. Sridevi,et al. Journal of Theoretical and Applied Information Technology Efficient Method of Audio Steganography by Modified Lsb Algorithm and Strong Encryption Key with Enhanced Security , 2022 .
[13] Renata Teixeira,et al. Early Recognition of Encrypted Applications , 2007, PAM.
[14] Mikhail J. Atallah,et al. The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions , 2006, MM&Sec '06.
[15] Sepp Hochreiter,et al. The Vanishing Gradient Problem During Learning Recurrent Neural Nets and Problem Solutions , 1998, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[16] Hosei Matsuoka. Spread Spectrum Audio Steganography Using Sub-band Phase Shifting , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[17] Lukás Burget,et al. Recurrent neural network based language model , 2010, INTERSPEECH.
[18] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[19] W. Bender,et al. Techniques for datahiding , 1996 .
[20] Colin Raffel,et al. Learning-Based Methods for Comparing Sequences, with Applications to Audio-to-MIDI Alignment and Matching , 2016 .
[21] Katerina J. Argyraki,et al. Generating Steganographic Text with LSTMs , 2017, ACL.
[22] Yongfeng Huang,et al. Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec , 2011, IEEE Transactions on Information Forensics and Security.
[23] Yongfeng Huang,et al. Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry , 2017, IH&MMSec.
[24] Thierry Bertin-Mahieux,et al. The Million Song Dataset , 2011, ISMIR.
[25] Tai-hoon Kim,et al. A View on LSB Based Audio Steganography , 2016 .
[26] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[27] Neil F. Johnson,et al. Detection of Hidden Information, Covert Channels and Information Flows , 2009 .
[28] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[29] Kaliappan Gopalan. Audio steganography using bit modification , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[30] Anupama,et al. INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY , 2011 .
[32] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[33] Dong-Yan Huang,et al. Robust and Inaudible Multi-echo Audio Watermarking , 2002, IEEE Pacific Rim Conference on Multimedia.
[34] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[35] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[36] Neha Gupta,et al. Dwt and Lsb based Audio Steganography , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).