Adversarial steganography based on sparse cover enhancement
暂无分享,去创建一个
[1] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[2] Fenlin Liu,et al. A novel haze image steganography method via cover-source switching , 2020, J. Vis. Commun. Image Represent..
[3] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[4] Jessica J. Fridrich,et al. Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.
[5] Kaiming He,et al. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[7] Luiz Eduardo Soares de Oliveira,et al. Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[8] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[9] Bin Li,et al. An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning , 2021, IEEE Transactions on Information Forensics and Security.
[10] Qilong Wang,et al. Is Second-Order Information Helpful for Large-Scale Visual Recognition? , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[11] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[12] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[13] Jessica J. Fridrich,et al. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.
[14] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[15] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[16] Jianyi Liu,et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.
[17] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[18] Bolin Chen,et al. Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.
[19] Yun Q. Shi,et al. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.
[20] Jialiang Chen,et al. Binary image steganalysis based on local texture pattern , 2018, J. Vis. Commun. Image Represent..
[21] Xianfeng Zhao,et al. Steganalytic feature based adversarial embedding for adaptive JPEG steganography , 2021, J. Vis. Commun. Image Represent..
[22] Jianhua Yang,et al. An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.
[23] Ross B. Girshick,et al. Fast R-CNN , 2015, 1504.08083.
[24] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[25] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[26] Bin Li,et al. New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.
[27] Yi Zhang,et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.
[28] Jessica J. Fridrich,et al. Theoretical model of the FLD ensemble classifier based on hypothesis testing theory , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[29] Xianfeng Zhao,et al. A Siamese CNN for Image Steganalysis , 2021, IEEE Transactions on Information Forensics and Security.
[30] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[31] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[32] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[33] Patrick Bas,et al. Explicit Optimization of min max Steganographic Game , 2021, IEEE Transactions on Information Forensics and Security.
[34] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[35] Jessica J. Fridrich,et al. Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[36] Li Li,et al. Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes , 2020, IEEE Transactions on Communications.
[37] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[38] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[39] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[40] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.
[41] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[42] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[43] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[44] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[45] Yann LeCun,et al. Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[46] Jessica J. Fridrich,et al. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.