Anti-steganalysis for image on convolutional neural networks
暂无分享,去创建一个
Xiangyang Luo | Xiaoguang Niu | Shiyu Li | Dengpan Ye | Shunzhi Jiang | Changrui Liu | X. Luo | Changrui Liu | Dengpan Ye | Shunzhi Jiang | Shiyu Li | Xiaoguang Niu
[1] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[2] Weiming Zhang,et al. On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..
[3] Xiangyang Luo,et al. Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[4] Shiguo Lian,et al. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.
[5] Jiangqun Ni,et al. Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.
[6] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[7] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[8] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[9] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[10] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[11] Yan Liu,et al. A Novel Convolutional Neural Network for Image Steganalysis With Shared Normalization , 2017, IEEE Transactions on Multimedia.
[12] Seyed-Mohsen Moosavi-Dezfooli,et al. Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Jason Yosinski,et al. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[14] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[15] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[16] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[17] Tomás Pevný. Detecting messages of unknown length , 2011, Electronic Imaging.
[18] Anthony Kulis,et al. Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies , 2009, Scalable Comput. Pract. Exp..
[19] Weiming Zhang,et al. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.
[20] P. N. Suganthan,et al. Differential Evolution: A Survey of the State-of-the-Art , 2011, IEEE Transactions on Evolutionary Computation.
[21] Stefan Winkler,et al. The Evolution of Video Quality Measurement: From PSNR to Hybrid Metrics , 2008, IEEE Transactions on Broadcasting.
[22] Kouichi Sakurai,et al. One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.
[23] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[24] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Pascal Frossard,et al. Analysis of universal adversarial perturbations , 2017, ArXiv.
[26] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[27] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..