A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Gibbs Construction in Steganography , 2010, IEEE Transactions on Information Forensics and Security.
[2] Kaustubh Choudhary. Image Steganography and Global Terrorism , 2012 .
[3] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[4] Lie-Hui Jiang,et al. A review on deep learning based image steganalysis , 2018, 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[5] Nareli Cruz Cortés,et al. Universal Steganography Detector Based on an Artificial Immune System for JPEG Images , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[6] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[7] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[8] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[9] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[10] I. Sasase. SATELLITE AND SPACE COMMUNICATIONS Technical Committee , 2000 .
[11] Biplab Sikdar. Security and Privacy for the Internet of Things , 2020 .
[12] Bin Li,et al. Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography , 2017, IEEE Transactions on Information Forensics and Security.
[13] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[14] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[15] P. R. Smith,et al. Bilinear interpolation of digital images , 1981 .
[16] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Tu-Thach Quach,et al. Cover estimation and payload location using Markov random fields , 2014, Electronic Imaging.
[19] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[20] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[21] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[22] Krzysztof Szczypiorski,et al. Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication , 2018, 2018 4th International Conference on Frontiers of Signal Processing (ICFSP).
[23] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[24] Feng Zhu,et al. Efficient feature learning and multi-size image steganalysis based on CNN , 2018, ArXiv.
[25] Yan Liu,et al. Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.
[26] Jessica J. Fridrich,et al. Effect of Image Downsampling on Steganographic Security , 2014, IEEE Transactions on Information Forensics and Security.
[27] David Megías,et al. Detection of Classifier Inconsistencies in Image Steganalysis , 2019, IH&MMSec.
[28] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[29] R. Keys. Cubic convolution interpolation for digital image processing , 1981 .
[30] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[31] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[32] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.