SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application
暂无分享,去创建一个
Dengpan Ye | Jiaqing Huang | Yueyun Shang | Zhuoyuan Zheng | Shunzhi Jiang | Yueyun Shang | Zhuoyuan Zheng | Dengpan Ye | Shunzhi Jiang | Jiaqing Huang
[1] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[2] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[3] Antonio Bonafonte,et al. SEGAN: Speech Enhancement Generative Adversarial Network , 2017, INTERSPEECH.
[4] Yi-Hsuan Yang,et al. MidiNet: A Convolutional Generative Adversarial Network for Symbolic-Domain Music Generation , 2017, ISMIR.
[5] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[6] Ye Dengpan,et al. Faster and transferable deep learning steganalysis on GPU , 2019 .
[7] Kun Yang,et al. Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.
[8] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[9] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[10] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[11] Fadi Al-Turjman,et al. Secure data transmission framework for confidentiality in IoTs , 2019, Ad Hoc Networks.
[12] Sonal K. Jagtap,et al. Audio Steganography Used for Secure Data Transmission , 2013 .
[13] Jian Sun,et al. Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2015, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Ying Zou,et al. Research on image steganography analysis based on deep learning , 2019, J. Vis. Commun. Image Represent..
[15] Yu Tsao,et al. Voice Conversion from Unaligned Corpora Using Variational Autoencoding Wasserstein Generative Adversarial Networks , 2017, INTERSPEECH.
[16] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[17] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[18] Alexei A. Efros,et al. Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[19] Sanjeev Khudanpur,et al. Librispeech: An ASR corpus based on public domain audio books , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[21] Peter James Vial,et al. High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform , 2020, Cognitive Systems Research.
[22] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[23] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[24] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[25] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.