MDRSteg: large-capacity image steganography based on multi-scale dilated ResNet and combined chi-square distance loss
暂无分享,去创建一个
Dadong Wang | Leqing Zhu | Lingqiang Mo | Jiaqi Ma | Huiyan Wang | Le-qing Zhu | Dadong Wang | Huiyan Wang | Jiaqi Ma | Lingqiang Mo
[1] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[2] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[3] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[4] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[5] Jianyi Liu,et al. Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.
[6] Xingming Sun,et al. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .
[7] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[8] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[9] Djemel Ziou,et al. Image Quality Metrics: PSNR vs. SSIM , 2010, 2010 20th International Conference on Pattern Recognition.
[10] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[11] Sébastien Ourselin,et al. Automatic Brain Tumor Segmentation Using Cascaded Anisotropic Convolutional Neural Networks , 2017, BrainLes@MICCAI.
[12] Yang Yang,et al. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network , 2018, Future Internet.
[13] Jianhua Yang,et al. An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.
[14] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[15] Rafia Rahim,et al. End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.
[16] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[17] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[18] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[19] Ankur Saxena,et al. DCT/DST-Based Transform Coding for Intra Prediction in Image/Video Coding , 2013, IEEE Transactions on Image Processing.
[20] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[21] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[22] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[23] Nasrin M. Makbol,et al. Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition , 2013 .
[24] Chuan Qin,et al. Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.
[25] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[26] Mohammad Mehdi Rashidi,et al. Increasing image compression rate using steganography , 2013, Expert Syst. Appl..
[27] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[28] P. Albrecht,et al. On the correct use of the chi-square goodness-of-fit test , 1980 .
[29] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[30] FridrichJessica,et al. Rich Models for Steganalysis of Digital Images , 2012 .
[31] Swaminathan Ramakrishnan,et al. Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission , 2014, Journal of Medical Systems.
[32] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[33] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[34] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[35] Trevor Darrell,et al. Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[37] Luc Van Gool,et al. The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.