Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019, Chengdu, China, November 2–4, 2019, Revised Selected Papers

Steganography has been widely used to conceal secret information in multimedia content. Using generative adversarial networks (GAN) where two subnetworks compete against each other, steganography can learn good distortion measurement. Nevertheless, the convergence speed of GAN is usually slow, and the performance of GAN-based steganography has large room to improve. In this paper, we propose a new GAN-based spatial steganographic scheme. The proposed learning framework consists of two parts: a steganographic generator and a steganalytic discriminator. The former generates stego images, and the latter evaluates their steganography security. Different from existing GAN-based steganography, we reconstruct the generator by combining multiple feature maps, and then expand the maximum number of feature channels to 256. The reconstruction generator can effectively generate a sophisticated probability map, which is used to calculate optimal distortion measurement and further provides a better guidance for adaptive information embedding. Comprehensive experimental results show that, with the same discriminant network, the anti-steganalysis performance of our method is better than that of ASDL-GAN scheme and Yang’s scheme.

[1]  Linna Zhou,et al.  Text Steganography Based on Online Chat , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Jiwu Huang,et al.  Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[5]  Donald E. Knuth,et al.  Digital halftones by dot diffusion , 1987, TOGS.

[6]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[7]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[8]  Tuomas Virtanen,et al.  TUT database for acoustic scene classification and sound event detection , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).

[9]  Yao Zhao,et al.  Robust median filtering detection based on the difference of frequency residuals , 2018, Multimedia Tools and Applications.

[10]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[11]  B. Pompe,et al.  Permutation entropy: a natural complexity measure for time series. , 2002, Physical review letters.

[12]  Kuo-Liang Chung,et al.  An error propagation free data hiding algorithm in HEVC intra-coded frames , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

[13]  Jessica J. Fridrich,et al.  Practical methods for minimizing embedding impact in steganography , 2007, Electronic Imaging.

[14]  Jan P. Allebach,et al.  Clustered-Dot Halftoning With Direct Binary Search , 2013, IEEE Transactions on Image Processing.

[15]  Yi Dong,et al.  Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model , 2017, IWDW.

[16]  Weiming Zhang,et al.  Decomposing Joint Distortion for Adaptive Steganography , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[18]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[19]  Qingzhong Liu,et al.  Derivative-based audio steganalysis , 2011, TOMCCAP.

[20]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[21]  Lei Zhu,et al.  Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..

[22]  Ke Niu,et al.  A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC , 2017 .

[23]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[24]  Asad Malik,et al.  Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image , 2019, Int. J. Digit. Crime Forensics.

[25]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[26]  Yao Zhao,et al.  Detection of image sharpening based on histogram aberration and ringing artifacts , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[27]  Oscar C. Au,et al.  Data hiding watermarking for halftone images , 2002, IEEE Trans. Image Process..

[28]  John Langford,et al.  The arbitrariness of reviews, and advice for school administrators , 2015, Commun. ACM.

[29]  Sos S. Agaian,et al.  Fractal steganography using artificially generated images , 2006, 2006 IEEE Region 5 Conference.

[30]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[31]  Xinpeng Zhang,et al.  Detection of double JPEG compression using modified DenseNet model , 2018, Multimedia Tools and Applications.

[32]  Gang Xiong,et al.  Image resampling detection based on texture classification , 2013, Multimedia Tools and Applications.

[33]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[34]  Chao Jin,et al.  Steganalysis of MP3Stego with low embedding-rate using Markov feature , 2017, Multimedia Tools and Applications.

[35]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[36]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[37]  Jiwu Huang,et al.  New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.

[38]  Craig H. Rowland,et al.  Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.

[39]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[40]  Peng Liu,et al.  Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec , 2017, Multimedia Systems.

[41]  Jana Dittmann,et al.  Mel-cepstrum-based steganalysis for VoIP steganography , 2007, Electronic Imaging.

[42]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[43]  Oscar C. Au,et al.  Halftone image data hiding with intensity selection and connection selection , 2001, Signal Process. Image Commun..

[44]  Neil F. Johnson,et al.  Detection of Hidden Information, Covert Channels and Information Flows , 2009 .

[45]  Ali Ahmadi,et al.  Quantization-Unaware Double JPEG Compression Detection , 2016, Journal of Mathematical Imaging and Vision.

[46]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[47]  Catherine A. Theohary,et al.  Terrorist Use of the Internet: Information Operations in Cyberspace , 2011 .

[48]  Gaobo Yang,et al.  Referenceless Measure of Blocking Artifacts by Tchebichef Kernel Analysis , 2014, IEEE Signal Processing Letters.

[49]  Christos Faloutsos,et al.  VolTime: Unsupervised Anomaly Detection on Users' Online Activity Volume , 2017, SDM.

[50]  Ton Kalker,et al.  Issues with digital watermarking and perceptual hashing , 2001, SPIE ITCom.

[51]  Yide Ma,et al.  Robust unsupervised feature selection via matrix factorization , 2017, Neurocomputing.

[52]  Lina Wang,et al.  An AMR adaptive steganography algorithm based on minimizing distortion , 2017, Multimedia Tools and Applications.

[53]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[54]  Apurva N. Mahajan,et al.  Detect Covert Channels in TCP/IP Header using Naive Bayes , 2015 .

[55]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[56]  Kuang-Shyr Wu A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..

[57]  Qin Zhang,et al.  Downscaling Factor Estimation on Pre-JPEG Compressed Images , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[58]  Jessica J. Fridrich,et al.  On detection of median filtering in digital images , 2010, Electronic Imaging.

[59]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[60]  Minoru Kuribayashi,et al.  Improved DM-QIM Watermarking Scheme for PDF Document , 2019, IWDW.

[61]  Chien-Chang Chen,et al.  A Geometry-Based Secret Image Sharing Approach , 2008, J. Inf. Sci. Eng..

[62]  Z. Jane Wang,et al.  Median Filtering Forensics Based on Convolutional Neural Networks , 2015, IEEE Signal Processing Letters.

[63]  Jessica Fridrich,et al.  Steganography With Multiple JPEG Images of the Same Scene , 2017, IEEE Transactions on Information Forensics and Security.

[64]  Weisi Lin,et al.  GridSAR: Grid strength and regularity for robust evaluation of blocking artifacts in JPEG images , 2015, J. Vis. Commun. Image Represent..

[65]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[66]  Vishal Monga,et al.  Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.

[67]  Weiming Zhang,et al.  Defining embedding distortion for motion vector-based video steganography , 2014, Multimedia Tools and Applications.

[68]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[69]  Graham Rawlinson,et al.  The Significance of Letter Position in Word Recognition , 2007, IEEE Aerospace and Electronic Systems Magazine.

[70]  Nashirah Abu Bakar,et al.  Cryptocurrency Framework Diagnostics from Islamic Finance Perspective: A New Insight of Bitcoin System Transaction , 2017 .

[71]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[72]  Raphaël Couturier,et al.  Blind digital watermarking in PDF documents using Spread Transform Dither Modulation , 2015, Multimedia Tools and Applications.

[73]  Guanshuo Xu,et al.  Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.

[74]  Chin-Chen Chang,et al.  Perceptual hashing for color images based on hybrid extraction of structural features , 2018, Signal Process..

[75]  Bin Li,et al.  Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.

[76]  Hsiu-Feng Lin,et al.  A COPYRIGHT PROTECTION SCHEME BASED ON PDF , 2012 .

[77]  H. Sebastian Seung,et al.  Learning the parts of objects by non-negative matrix factorization , 1999, Nature.

[78]  Vojtech Holub,et al.  On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.

[79]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[80]  M. Iansiti,et al.  The Truth about Blockchain , 2017 .

[81]  Yongfeng Huang,et al.  A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.

[82]  Davide Cozzolino,et al.  Splicebuster: A new blind image splicing detector , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[83]  Shiguang Liu,et al.  Robustness and Discrimination Oriented Hashing Combining Texture and Invariant Vector Distance , 2018, ACM Multimedia.

[84]  Soo-Chang Pei,et al.  High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter , 2006, IEEE Transactions on Image Processing.

[85]  Seyed Reza Shahamiri,et al.  Artificial neural networks as speech recognisers for dysarthric speech: Identifying the best-performing set of MFCC parameters and studying a speaker-independent approach , 2014, Adv. Eng. Informatics.

[86]  Yu Zhang,et al.  A Steganography Scheme Based on Fractal Images , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[87]  Brian K. Lien,et al.  Improved Halftone Data Hiding Scheme Using Hilbert Curve Neighborhood Toggling , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[88]  Iryna Gurevych,et al.  Is it Time to Swish? Comparing Deep Learning Activation Functions Across NLP tasks , 2018, EMNLP.

[89]  Tamer Shanableh Matrix encoding for data hiding using multilayer video coding and transcoding solutions , 2012, Signal Process. Image Commun..

[90]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[91]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[92]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[93]  Eric Gilbert,et al.  VADER: A Parsimonious Rule-Based Model for Sentiment Analysis of Social Media Text , 2014, ICWSM.

[94]  Ketan Anand,et al.  Anomaly detection in online social network: A survey , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).

[95]  Pawel Korus,et al.  Adaptive Self-Embedding Scheme With Controlled Reconstruction Performance , 2014, IEEE Transactions on Information Forensics and Security.

[96]  Geoffrey E. Hinton,et al.  Dynamic Routing Between Capsules , 2017, NIPS.

[97]  Saylee Gharge,et al.  Review on Various Visual Cryptography Schemes , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).

[98]  Xianfeng Zhao,et al.  Pitch Delay Based Adaptive Steganography for AMR Speech Stream , 2018, IWDW.

[99]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[100]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[101]  Jessica J. Fridrich,et al.  Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model , 2015, Electronic Imaging.

[102]  Chen Gong,et al.  Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position , 2019, IH&MMSec.

[103]  Diqun Yan,et al.  Audio Steganalysis with Improved Convolutional Neural Network , 2019, IH&MMSec.

[104]  Jr. J.P. Campbell,et al.  Speaker recognition: a tutorial , 1997, Proc. IEEE.

[105]  Olivier Déforges,et al.  Design and security analysis of two robust keyed hash functions based on chaotic neural networks , 2019, Journal of Ambient Intelligence and Humanized Computing.

[106]  Kai Chen,et al.  Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification , 2018, Secur. Commun. Networks.

[107]  Ling Shao,et al.  Binary Multi-View Clustering , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[108]  Jean-Luc Dugelay,et al.  Reversible Image Data Hiding with Contrast Enhancement , 2015, IEEE Signal Processing Letters.

[109]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[110]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[111]  Yong-Feng Huang,et al.  RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.

[112]  Jian Sun,et al.  Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[113]  M.H. Shirali-Shahreza,et al.  Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.

[114]  Ivan Laptev,et al.  Is object localization for free? - Weakly-supervised learning with convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[115]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[116]  Rong Zhang,et al.  No-Reference JPEG Image Quality Assessment Based on Blockiness and Luminance Change , 2017, IEEE Signal Processing Letters.

[117]  Yongfeng Huang,et al.  TS-RNN: Text Steganalysis Based on Recurrent Neural Networks , 2019, IEEE Signal Processing Letters.

[118]  Peter Vary,et al.  High rate data hiding in ACELP speech codecs , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[119]  Ming Tang,et al.  AMR Steganalysis Based on the Probability of Same Pulse Position , 2015, IEEE Transactions on Information Forensics and Security.

[120]  Wei Lu,et al.  Secure Binary Image Steganography Based on Fused Distortion Measurement , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[121]  Wei Lu,et al.  Secure Binary Image Steganography With Distortion Measurement Based on Prediction , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[122]  Pierre Boulanger,et al.  Digital marbling: a multiscale fluid model , 2006, IEEE Transactions on Visualization and Computer Graphics.

[123]  MARCO CARPENTIERI A perfect threshold secret sharing scheme to identify cheaters , 1995, Des. Codes Cryptogr..

[124]  Xinpeng Zhang,et al.  Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.

[125]  Xiao Zeng,et al.  Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.

[126]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[127]  Weiming Zhang,et al.  Reversibility improved data hiding in encrypted images , 2014, Signal Process..

[128]  Jiri Fridrich,et al.  Robust hash functions for digital watermarking , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[129]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[130]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[131]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[132]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[133]  Yun Q. Shi,et al.  Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.

[134]  Wei Lu,et al.  Copy-move forgery detection using combined features and transitive matching , 2018, Multimedia Tools and Applications.

[135]  Xianfeng Zhao,et al.  RHFCN:: Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[136]  Yun Q. Shi,et al.  Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration , 2013, IWDW.

[137]  Tie-Yan Liu,et al.  On the Depth of Deep Neural Networks: A Theoretical View , 2015, AAAI.

[138]  Lina Wang,et al.  A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame , 2017, IWDW.

[139]  Fouad Khelifi,et al.  Perceptual Image Hashing Based on Virtual Watermark Detection , 2010, IEEE Transactions on Image Processing.

[140]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[141]  Gwoboa Horng,et al.  Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..

[142]  Zhili Chen,et al.  A new scheme for covert communication via 3G encoded speech , 2012, Comput. Electr. Eng..

[143]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[144]  Jagannath H. Nirmal,et al.  A unique approach in text independent speaker recognition using MFCC feature sets and probabilistic neural network , 2015, 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR).

[145]  Patrick Pérez,et al.  Poisson image editing , 2003, ACM Trans. Graph..

[146]  Chao Li,et al.  Active Transfer Learning Network: A Unified Deep Joint Spectral–Spatial Feature Learning Model for Hyperspectral Image Classification , 2019, IEEE Transactions on Geoscience and Remote Sensing.

[147]  Shanyu Tang,et al.  An Approach to Information Hiding in Low Bit-Rate Speech Stream , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[148]  Yao Zhao,et al.  Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding , 2015, Signal Process..

[149]  Yoshua Bengio,et al.  Domain Adaptation for Large-Scale Sentiment Classification: A Deep Learning Approach , 2011, ICML.

[150]  Andrew D. Ker The Square Root Law of Steganography: Bringing Theory Closer to Practice , 2017, IH&MMSec.

[151]  Jia Liu,et al.  Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion , 2017, EIDWT.

[152]  Marc Chaumont,et al.  Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.

[153]  Yongfeng Huang,et al.  Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry , 2017, IH&MMSec.

[154]  Qiang Cheng,et al.  Generalized Embedding of Multiplicative Watermarks , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[155]  Jiangqun Ni,et al.  A deep learning approach to detection of splicing and copy-move forgeries in images , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[156]  Mohammad Iftekhar Husain,et al.  Covert Botnet Command and Control Using Twitter , 2015, ACSAC.

[157]  Xiao Xiang Zhu,et al.  Deep Recurrent Neural Networks for Hyperspectral Image Classification , 2017, IEEE Transactions on Geoscience and Remote Sensing.

[158]  Paolo Bestagini,et al.  First Steps Toward Camera Model Identification With Convolutional Neural Networks , 2016, IEEE Signal Processing Letters.

[159]  Marc Chaumont,et al.  Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[160]  Brian K. Lien,et al.  Reversible data hiding for ordered dithered halftone images , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[161]  Jiwu Huang,et al.  Evaluation of random field models in multi-modal unsupervised tampering localization , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[162]  Yongfeng Huang,et al.  A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding , 2017, SecureComm.

[163]  Bolin Chen,et al.  Audio Steganalysis with Convolutional Neural Network , 2017, IH&MMSec.

[164]  Matti Pietikäinen,et al.  A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..

[165]  Douglas A. Reynolds,et al.  Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..

[166]  Frank Hutter,et al.  SGDR: Stochastic Gradient Descent with Restarts , 2016, ArXiv.

[167]  Jessica J. Fridrich,et al.  Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[168]  H. A. Aly,et al.  Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error , 2011, IEEE Transactions on Information Forensics and Security.

[169]  Richard S. Zemel,et al.  Prototypical Networks for Few-shot Learning , 2017, NIPS.

[170]  D. G. Bhalke,et al.  Speaker verification using Gaussian Mixture Model , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[171]  Xiangyang Luo,et al.  Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[172]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[173]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[174]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[175]  Feiping Nie,et al.  Adaptive-weighting discriminative regression for multi-view classification , 2019, Pattern Recognit..

[176]  Jan P. Allebach,et al.  Quad-interleaved Block Level Parallel Direct Binary Search Algorithm , 2016, Color Imaging: Displaying, Processing, Hardcopy, and Applications.

[177]  Yan Liu,et al.  Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.

[178]  Alexander Kain,et al.  Spectral voice conversion for text-to-speech synthesis , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[179]  Wei Wang,et al.  New Graph-Theoretic Approach to Social Steganography , 2019, Media Watermarking, Security, and Forensics.

[180]  Xin He,et al.  Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis , 2012, ACIIDS.

[181]  Juha Partala,et al.  Provably Secure Covert Communication on Blockchain , 2018, Cryptogr..

[182]  Steve Harenberg,et al.  Anomaly detection in dynamic networks: a survey , 2015 .

[183]  Mohamad Khalil,et al.  Secure Hash Algorithm based on Efficient Chaotic Neural Network , 2016, 2016 International Conference on Communications (COMM).

[184]  Jiwu Huang,et al.  Identification of Various Image Operations Using Residual-Based Features , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[185]  Mohammad Saniee Abadeh,et al.  Image steganalysis using a bee colony based feature selection algorithm , 2014, Eng. Appl. Artif. Intell..

[186]  Yongfeng Huang,et al.  RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.

[187]  Kun Yang,et al.  CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain , 2018, IH&MMSec.

[188]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[189]  Wei Lu,et al.  Efficient halftone image steganography based on dispersion degree optimization , 2018, Journal of Real-Time Image Processing.

[190]  Jing-Ming Guo,et al.  Improved data hiding in halftone images with cooperating pair toggling human visual system , 2008, Int. J. Imaging Syst. Technol..

[191]  Oriol Vinyals,et al.  Matching Networks for One Shot Learning , 2016, NIPS.

[192]  Kilian Q. Weinberger,et al.  Marginalized Denoising Autoencoders for Domain Adaptation , 2012, ICML.

[193]  Roman Senkerik,et al.  Steganography Detection by Means of Neural Networks , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.

[194]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[195]  Dana S. Richards,et al.  Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.

[196]  Yue Zhang,et al.  Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding , 2017, IWDW.

[197]  Pao-Chi Chang,et al.  Spectral-temporal receptive fields and MFCC balanced feature extraction for robust speaker recognition , 2016, Multimedia Tools and Applications.

[198]  Rik Van de Walle,et al.  Out-of-the-loop information hiding for HEVC video , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[199]  Xijian Ping,et al.  Steganalysis of Analysis-by-Synthesis Compressed Speech , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[200]  Hetal N. Patel,et al.  Design of a color palette based image steganography algorithm for fractal images , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[201]  Jing Dong,et al.  CASIA Image Tampering Detection Evaluation Database , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[202]  Wei Lu,et al.  Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.

[203]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[204]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[205]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[206]  Xiaogang Jin,et al.  From design methodology to evolutionary design: An interactive creation of marble-like textile patterns , 2014, Eng. Appl. Artif. Intell..

[207]  Tomás Pevný,et al.  A mishmash of methods for mitigating the model mismatch mess , 2014, Electronic Imaging.

[208]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[209]  K. J. Ray Liu,et al.  Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.

[210]  K. V. Arya,et al.  Feature selection for image steganalysis using levy flight-based grey wolf optimization , 2018, Multimedia Tools and Applications.

[211]  Kai Wang,et al.  General-purpose image forensics using patch likelihood under image statistical models , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[212]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[213]  Shuangyuan Yang,et al.  Content-based image authentication: current status, issues, and challenges , 2007, International Conference on Semantic Computing (ICSC 2007).

[214]  Ming Yu Fan,et al.  An Efficient Separable Reversible Data Hiding Using Paillier Cryptosystem for Preserving Privacy in Cloud Domain , 2019 .

[215]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[216]  Ching-Nung Yang,et al.  (k,n) secret image sharing scheme capable of cheating detection , 2018, EURASIP J. Wirel. Commun. Netw..

[217]  Vincent H. Berk,et al.  Detection of Covert Channel Encoding in Network Packet Delays , 2005 .

[218]  Rainer Böhme,et al.  The 'Dresden Image Database' for benchmarking digital image forensics , 2010, SAC '10.

[219]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[220]  Bo Hu,et al.  Quaternion Discrete Cosine Transform and its Application in Color Template Matching , 2008, 2008 Congress on Image and Signal Processing.

[221]  Qasim Mohammed Hussein,et al.  Suitability of Using Julia Set Images as a Cover for Hiding Information , 2018, 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT).

[222]  Wanqi Li,et al.  Towards a Protocol for Autonomic Covert Communication , 2011, ATC.

[223]  Monali Mavani,et al.  Covert channel in IPv6 Destination option Extension header , 2014, 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).

[224]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[225]  Sorin Iftene,et al.  Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes , 2010, IACR Cryptol. ePrint Arch..

[226]  Jan P. Allebach,et al.  Impact of HVS models on model-based halftoning , 2002, IEEE Trans. Image Process..

[227]  Rahul V. Patil,et al.  Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution , 2015 .

[228]  A. Piva An Overview on Image Forensics , 2013 .

[229]  Zenglin Xu,et al.  Self-weighted multi-view clustering with soft capped norm , 2018, Knowl. Based Syst..

[230]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[231]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[232]  Michael I. Jordan,et al.  Deep Transfer Learning with Joint Adaptation Networks , 2016, ICML.

[233]  Shuli Zheng,et al.  Lossless Data Hiding Based on Homomorphic Cryptosystem , 2019, IEEE Transactions on Dependable and Secure Computing.

[234]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[235]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[236]  Yanxiao Liu Linear (k, n) Secret Sharing Scheme with Cheating Detection , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[237]  William Puech,et al.  Perceptual Image Hashing , 2012 .

[238]  Akira Nishimura Data Hiding in Pitch Delay Data of the Adaptive Multi-Rate Narrow-band Speech Codec , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[239]  Chin-Chen Chang,et al.  Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery , 2018, IEEE MultiMedia.

[240]  Guy Pujolle,et al.  A Vademecum on Blockchain Technologies: When, Which, and How , 2019, IEEE Communications Surveys & Tutorials.

[241]  Jiwu Huang,et al.  A universal image forensic strategy based on steganalytic model , 2014, IH&MMSec '14.

[242]  Wen-Hsiang Tsai,et al.  A new approach to covert communication via PDF files , 2010, Signal Process..

[243]  Avinash Madasu,et al.  Gated Convolutional Neural Networks for Domain Adaptation , 2019, NLDB.

[244]  Yao Zhao,et al.  Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis , 2011, IEEE Signal Processing Letters.

[245]  Taeshik Shon,et al.  A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine , 2003, ICICS.

[246]  Andreas Rössler,et al.  ForensicTransfer: Weakly-supervised Domain Adaptation for Forgery Detection , 2018, ArXiv.

[247]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[248]  Tomás Pevný,et al.  Benchmarking for Steganography , 2008, Information Hiding.

[249]  Hong Zhang,et al.  Motion vector-based video steganography with preserved local optimality , 2016, Multimedia Tools and Applications.

[250]  Jing-Ming Guo,et al.  High efficient Direct Binary Search using Multiple Lookup Tables , 2012, 2012 19th IEEE International Conference on Image Processing.

[251]  Shaohua Tang,et al.  A high-capacity reversible data hiding method for homomorphic encrypted images , 2019, J. Vis. Commun. Image Represent..

[252]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[253]  Wei Lu,et al.  Binary image steganalysis based on pixel mesh Markov transition matrix , 2015, J. Vis. Commun. Image Represent..

[254]  Mikhail J. Atallah,et al.  Information hiding through errors: a confusing approach , 2007, Electronic Imaging.

[255]  Ran-Zan Wang,et al.  Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.

[256]  Xuelong Li,et al.  Facial Skin Beautification Using Adaptive Region-Aware Masks , 2014, IEEE Transactions on Cybernetics.

[257]  Yann LeCun,et al.  Generalization and network design strategies , 1989 .

[258]  Mo Chen,et al.  JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.

[259]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[260]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[261]  William W. Streilein,et al.  Detecting HTTP Tunneling Activities , 2002 .

[262]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[263]  Jessica J. Fridrich,et al.  Study of cover source mismatch in steganalysis and ways to mitigate its impact , 2014, Electronic Imaging.

[264]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[265]  Pichao Wang,et al.  Robust unsupervised feature selection via dual self-representation and manifold regularization , 2018, Knowl. Based Syst..

[266]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[267]  Anil K. Jain,et al.  Face Detection in Color Images , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[268]  Zhenxing Qian,et al.  Diversity-Based Cascade Filters for JPEG Steganalysis , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[269]  Jian Sun,et al.  Identity Mappings in Deep Residual Networks , 2016, ECCV.

[270]  Sushanta Biswas,et al.  A new (k, n) verifiable secret image sharing scheme (VSISS) , 2014 .

[271]  Hongbin Zhang,et al.  High Capacity Data Hiding for Halftone Image Authentication , 2012, IWDW.

[272]  Yan Liu,et al.  Steganalysis via Deep Residual Network , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).

[273]  Kenji Fukumizu,et al.  Equivalence of distance-based and RKHS-based statistics in hypothesis testing , 2012, ArXiv.

[274]  Weisi Lin,et al.  A locally-adaptive algorithm for measuring blocking artifacts in images and videos , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[275]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[276]  Wei Lu,et al.  Region duplication detection based on hybrid feature and evaluative clustering , 2019, Multimedia Tools and Applications.

[277]  Wei Zheng,et al.  Robust unsupervised feature selection by nonnegative sparse subspace learning , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[278]  Yao Zhao,et al.  Forensic detection of median filtering in digital images , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[279]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[280]  Yao Zhao,et al.  Median filtering detection of small-size image based on CNN , 2018, J. Vis. Commun. Image Represent..

[281]  Xiangwei Kong,et al.  Cover-Source Mismatch in Deep Spatial Steganalysis , 2019, IWDW.

[282]  Yun Q. Shi,et al.  A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern , 2013, IWDW.

[283]  Wei Wu,et al.  GMM Supervector Based SVM with Spectral Features for Speech Emotion Recognition , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[284]  Chi-Man Pun,et al.  Quaternion-Based Image Hashing for Adaptive Tampering Localization , 2016, IEEE Transactions on Information Forensics and Security.

[285]  Xianfeng Zhao,et al.  Defining Joint Embedding Distortion for Adaptive MP3 Steganography , 2019, IH&MMSec.

[286]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[287]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[288]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[289]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[290]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[291]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[292]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[293]  DeLiang Wang,et al.  Analyzing noise robustness of MFCC and GFCC features in speaker identification , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[294]  KokSheik Wong,et al.  A Unified Data Embedding and Scrambling Method , 2014, IEEE Transactions on Image Processing.

[295]  Xueqing Wang,et al.  A new audio steganalysis method based on linear prediction , 2017, Multimedia Tools and Applications.

[296]  Xiaolong Li,et al.  A Statistics-Based Watermarking Scheme Robust to Print-and-Scan , 2008, 2008 International Symposium on Electronic Commerce and Security.

[297]  Andrew D. Ker,et al.  Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.

[298]  Yu-Chi Chen,et al.  Encrypted image-based reversible data hiding with public key cryptography from difference expansion , 2015, Signal Process. Image Commun..

[299]  Su Xiao THE RESULTING OF THE SYMMETRIC FRACTAL ART IMAGES WITH IMPROVED NEWTON RAPHSON METHOD , 1999 .

[300]  Hongxia Wang,et al.  Reversible data hiding in homomorphically encrypted image using interpolation technique , 2019, J. Inf. Secur. Appl..

[301]  Lip Yee Por,et al.  Information Hiding: A New Approach in Text Steganography , 2008 .

[302]  Hang Zhou,et al.  Defining Cost Functions for Adaptive JPEG Steganography at the Microscale , 2019, IEEE Transactions on Information Forensics and Security.

[303]  Chi-Man Pun,et al.  Robust image hashing using progressive feature selection for tampering detection , 2017, Multimedia Tools and Applications.

[304]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[305]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[306]  Gao Hai-ying,et al.  The MP3 Steganography Algorithm Based on Huffman Coding , 2007 .

[307]  Jiwu Huang,et al.  Fragility Analysis of Adaptive Quantization-Based Image Hashing , 2010, IEEE Transactions on Information Forensics and Security.

[308]  K. J. Ray Liu,et al.  Robust Median Filtering Forensics Using an Autoregressive Model , 2013, IEEE Transactions on Information Forensics and Security.

[309]  Dong-Ming Yan,et al.  Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks , 2018, IEEE Transactions on Information Forensics and Security.

[310]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[311]  KokSheik Wong,et al.  Information hiding in HEVC standard using adaptive coding block size decision , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[312]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[313]  Weiming Zhang,et al.  A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images , 2017, Multimedia Tools and Applications.

[314]  Xingming Sun,et al.  Linguistic steganalysis using the features derived from synonym frequency , 2012, Multimedia Tools and Applications.

[315]  Oscar C. Au,et al.  Data hiding in halftone images with parity coding , 2001, IS&T/SPIE Electronic Imaging.

[316]  Chang-Tsun Li,et al.  Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[317]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[318]  Jiangqun Ni,et al.  An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[319]  Jie Yang,et al.  An efficient information hiding method based on motion vector space encoding for HEVC , 2017, Multimedia Tools and Applications.

[320]  Latika Singh,et al.  A hybrid feature selection approach based on improved PSO and filter approaches for image steganalysis , 2016, Int. J. Mach. Learn. Cybern..

[321]  Chun-Wei Yang,et al.  Recover the tampered image based on VQ indexing , 2010, Signal Process..

[322]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[323]  Jessica J. Fridrich,et al.  Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.

[324]  Ki-Hyun Jung A high-capacity reversible data hiding scheme based on sorting and prediction in digital images , 2016, Multimedia Tools and Applications.

[325]  John F. Jarvis,et al.  A survey of techniques for the display of continuous tone pictures on bilevel displays , 1976 .

[326]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[327]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[328]  Jiwu Huang,et al.  Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images , 2016, IEEE Transactions on Image Processing.

[329]  Panagiotis Tsakalides,et al.  Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models , 2005, IEEE Transactions on Multimedia.

[330]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.

[331]  Wei Lu,et al.  Image Deblocking Detection Based on a Convolutional Neural Network , 2019, IEEE Access.

[332]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[333]  Marc Chaumont,et al.  Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[334]  Ali Broumandnia,et al.  Image steganalysis using improved particle swarm optimization based feature selection , 2018, Applied Intelligence.

[335]  Ramarathnam Venkatesan,et al.  Robust image hashing , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[336]  Kun Yang,et al.  Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution , 2017, International Workshop on Digital Watermarking.

[337]  Xian-Mo Zhang,et al.  Cheating Prevention in Linear Secret Sharing , 2002, ACISP.

[338]  Di Xiao,et al.  Reversible data hiding in encrypted images using cross division and additive homomorphism , 2015, Signal Process. Image Commun..

[339]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[340]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[341]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[342]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[343]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[344]  Bin Li,et al.  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..

[345]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[346]  Wei Lu,et al.  Binary image steganography based on joint distortion measurement , 2019, J. Vis. Commun. Image Represent..

[347]  Heidi A. Peterson,et al.  Luminance-model-based DCT quantization for color image compression , 1992, Electronic Imaging.

[348]  Grzegorz Lewandowski,et al.  Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.

[349]  Yicong Zhou,et al.  Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling , 2019, IEEE Transactions on Multimedia.

[350]  Rangding Wang,et al.  Tunable data hiding in partially encrypted H.264/AVC videos , 2017, J. Vis. Commun. Image Represent..

[351]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[352]  Qingzhong Liu,et al.  Temporal Derivative-Based Spectrum and Mel-Cepstrum Audio Steganalysis , 2009, IEEE Transactions on Information Forensics and Security.

[353]  Gerald Schaefer,et al.  UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.

[354]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[355]  Mohan S. Kankanhalli,et al.  Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.

[356]  P. P. Vaidyanathan,et al.  Optimized halftoning using dot diffusion and methods for inverse halftoning , 2000, IEEE Trans. Image Process..

[357]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[358]  Giulia Boato,et al.  Forensics of High Quality and Nearly Identical JPEG Image Recompression , 2016, IH&MMSec.

[359]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[360]  Belhassen Bayar,et al.  Constrained Convolutional Neural Networks: A New Approach Towards General Purpose Image Manipulation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[361]  Feiping Nie,et al.  Robust feature selection via simultaneous sapped norm and sparse regularizer minimization , 2018, Neurocomputing.

[362]  Ryan Prenger,et al.  Waveglow: A Flow-based Generative Network for Speech Synthesis , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[363]  Christos Faloutsos,et al.  Modeling Temporal Activity to Detect Anomalous Behavior in Social Media , 2017, ACM Trans. Knowl. Discov. Data.

[364]  Xinpeng Zhang,et al.  Lost in the Digital Wild: Hiding Information in Digital Activities , 2018, MPS@CCS.

[365]  Luc Van Gool,et al.  Adversarial Binary Coding for Efficient Person Re-Identification , 2018, 2019 IEEE International Conference on Multimedia and Expo (ICME).

[366]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[367]  Xinpeng Zhang,et al.  Selective Ensemble Classification of Image Steganalysis Via Deep Q Network , 2019, IEEE Signal Processing Letters.

[368]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[369]  Alessandro Piva,et al.  Detection of Nonaligned Double JPEG Compression Based on Integer Periodicity Maps , 2012, IEEE Transactions on Information Forensics and Security.

[370]  Hany Farid,et al.  Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.

[371]  Xingyu Yan,et al.  Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system , 2018, Quantum Information Processing.

[372]  Chen Cui,et al.  Depth Information Estimation-Based DIBR 3D Image Hashing Using SIFT Feature Points , 2020 .

[373]  Bin Li,et al.  New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator , 2017, IEEE Transactions on Information Forensics and Security.

[374]  Meisam Khalil Arjmandi,et al.  Audio steganalysis based on reversed psychoacoustic model of human hearing , 2016, Digit. Signal Process..

[375]  Xuelong Li,et al.  Block-Row Sparse Multiview Multilabel Learning for Image Classification , 2016, IEEE Transactions on Cybernetics.

[376]  Paolo Bestagini,et al.  Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks , 2017, J. Vis. Commun. Image Represent..

[377]  Zachary Chase Lipton A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.

[378]  Alex Graves,et al.  Supervised Sequence Labelling with Recurrent Neural Networks , 2012, Studies in Computational Intelligence.

[379]  Rangding Wang,et al.  Separable and error-free reversible data hiding in encrypted images , 2016, Signal Process..

[380]  Jessica J. Fridrich,et al.  Calibration revisited , 2009, MM&Sec '09.

[381]  Minqing Zhang,et al.  Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC , 2017 .

[382]  Jing-Ming Guo,et al.  Halftone-Image Security Improving Using Overall Minimal-Error Searching , 2011, IEEE Transactions on Image Processing.

[383]  Yi Ma,et al.  Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.

[384]  Kejiang Chen,et al.  Defining Joint Distortion for JPEG Steganography , 2018, IH&MMSec.

[385]  Yuting Su,et al.  Smooth filtering identification based on convolutional neural networks , 2019, Multimedia Tools and Applications.

[386]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[387]  Koby Crammer,et al.  A theory of learning from different domains , 2010, Machine Learning.

[388]  KokSheik Wong,et al.  HEVC video authentication using data embedding technique , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[389]  Maxim Anikeev,et al.  Network Based Detection of Passive Covert Channels in TCP/IP , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[390]  Eric Moulines,et al.  Pitch-synchronous waveform processing techniques for text-to-speech synthesis using diphones , 1989, Speech Commun..

[391]  Jianyi Liu,et al.  Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.

[392]  Liusheng Huang,et al.  Steganalysis of Compressed Speech Based on Markov and Entropy , 2013, IWDW.

[393]  Tiegang Gao,et al.  Robust detection of median filtering based on combined features of difference image , 2019, Signal Process. Image Commun..

[394]  Touradj Ebrahimi,et al.  Calculation of average coding efficiency based on subjective quality scores , 2014, Journal of Visual Communication and Image Representation.

[395]  Josef Pieprzyk,et al.  Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis , 2010, ISPEC.

[396]  Fei Peng,et al.  Improved PVO-based reversible data hiding , 2014, Digit. Signal Process..

[397]  Peng Liu,et al.  Steganography integrated into linear predictive coding for low bit-rate speech codec , 2016, Multimedia Tools and Applications.

[398]  Rangding Wang,et al.  An improved scheme for data hiding in encrypted H.264/AVC videos , 2016, J. Vis. Commun. Image Represent..

[399]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[400]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[401]  Wael Abd-Almageed,et al.  BusterNet: Detecting Copy-Move Image Forgery with Source/Target Localization , 2018, ECCV.

[402]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[403]  Yuan Yujin,et al.  Research of speaker recognition based on combination of LPCC and MFCC , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[404]  Nobuo Funabiki,et al.  Robust and Secure Data Hiding for PDF Text Document , 2019, IEICE Trans. Inf. Syst..

[405]  Shijun Xiang,et al.  Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[406]  Qin Bo,et al.  Improving image copy-move forgery detection with particle swarm optimization techniques , 2016, China Communications.

[407]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[408]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[409]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[410]  Sebastian Zander,et al.  Stealthier Inter-packet Timing Covert Channels , 2011, Networking.

[411]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[412]  Xinxin Niu,et al.  Non-uniform Quantization in Breaking HUGO , 2013, IWDW.

[413]  Xueqi Cheng,et al.  Data Hiding in a Kind of PDF Texts for Secret Communication , 2007, Int. J. Netw. Secur..

[414]  Oscar C. Au,et al.  Data hiding by smart pair toggling for halftone images , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[415]  Xu Zhang,et al.  Digital image encryption scheme based on generalized Mandelbrot-Julia set , 2019, Optik.

[416]  Xijian Ping,et al.  Steganalysis of Compressed Speech Based on Histogram Features , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[417]  Alessandro Piva,et al.  Image Forgery Localization via Block-Grained Analysis of JPEG Artifacts , 2012, IEEE Transactions on Information Forensics and Security.

[418]  Qi Shen,et al.  Perceptual hashing for color image based on color opponent component and quadtree structure , 2020, Signal Process..

[419]  Xinpeng Zhang,et al.  Behavior Steganography in Social Network , 2017 .

[420]  Bo Jiang,et al.  A CABAC based HEVC video steganography algorithm without bitrate increase , 2015 .

[421]  Feiping Nie,et al.  Efficient and Robust Feature Selection via Joint ℓ2, 1-Norms Minimization , 2010, NIPS.

[422]  David J. Sakrison,et al.  The effects of a visual fidelity criterion of the encoding of images , 1974, IEEE Trans. Inf. Theory.

[423]  Z. Jane Wang,et al.  Compressed Binary Image Hashes Based on Semisupervised Spectral Embedding , 2013, IEEE Transactions on Information Forensics and Security.

[424]  Jessica J. Fridrich,et al.  Effect of Image Downsampling on Steganographic Security , 2014, IEEE Transactions on Information Forensics and Security.

[425]  Yongfeng Huang,et al.  RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model , 2018, ICCCS.

[426]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[427]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).