Enhancing JPEG Steganography using Iterative Adversarial Examples
暂无分享,去创建一个
Bolin Chen | Jiwu Huang | Weiqi Luo | Tingting Song | Huaxiao Mo | Jiwu Huang | Weiqi Luo | Huaxiao Mo | Bolin Chen | Tingting Song
[1] Xianfeng Zhao,et al. Weakening the Detecting Capability of CNN-based Steganalysis , 2018, ArXiv.
[2] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[3] Marc Chaumont,et al. Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[4] Bolin Chen,et al. Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.
[5] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[6] Jessica J. Fridrich,et al. Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[7] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[8] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[9] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[10] Marc Chaumont,et al. Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[11] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[12] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[13] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[14] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[15] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[16] Peijia Zheng,et al. Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference , 2019, IH&MMSec.
[17] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[18] John Klein,et al. Exploiting Adversarial Embeddings for Better Steganography , 2019, IH&MMSec.
[19] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.