Batch Steganography via Generative Network
暂无分享,去创建一个
Zhenxing Qian | Xiaolong Li | Xinpeng Zhang | Zichi Wang | Nan Zhong | Xinpeng Zhang | Xiaolong Li | Zhenxing Qian | Zichi Wang | Nan Zhong
[1] Junying Yuan,et al. Embedding Suitability Adaptive Cover Selection for Image Steganography , 2014 .
[2] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[3] Yan Liu,et al. What makes the stego image undetectable? , 2015, ICIMCS '15.
[4] Changjun Liu,et al. Embedding Strategy for Batch Adaptive Steganography , 2016, IWDW.
[5] Jessica J. Fridrich,et al. Practical strategies for content-adaptive batch steganography and pooled steganalysis , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[7] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[8] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[9] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[10] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Hedieh Sajedi,et al. Secure Cover Selection Steganography , 2009, ISA.
[12] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[13] Li Fei-Fei,et al. Perceptual Losses for Real-Time Style Transfer and Super-Resolution , 2016, ECCV.
[14] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[15] Weiming Zhang,et al. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes , 2008, Information Hiding.
[16] Andrea Vedaldi,et al. Instance Normalization: The Missing Ingredient for Fast Stylization , 2016, ArXiv.
[17] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[18] Kejiang Chen,et al. Improving the Embedding Strategy for Batch Adaptive Steganography , 2018, IWDW.
[19] Jessica J. Fridrich,et al. Further study on the security of S-UNIWARD , 2014, Electronic Imaging.
[20] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[21] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[22] Xinpeng Zhang,et al. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization , 2018, IEEE Signal Processing Letters.
[23] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[24] Kejiang Chen,et al. Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.
[25] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[26] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[27] Changjun Liu,et al. Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain , 2017, Multimedia Tools and Applications.
[28] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[29] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.