暂无分享,去创建一个
Guodong Guo | Xiaokang Yang | Menghan Hu | Guangtao Zhai | Kang Chen | Zhongpai Gao | Jun Jia | Xiaokang Yang | G. Guo | Guangtao Zhai | Menghan Hu | Zhongpai Gao | Kang Chen | Jun Jia
[1] Kai Liu,et al. Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.
[2] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[3] Lei Xu,et al. SteganoGAN: High Capacity Image Steganography with GANs , 2019, ArXiv.
[4] Jia Liu,et al. Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks , 2017, ArXiv.
[5] Alexei A. Efros,et al. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[6] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[7] Weisi Lin,et al. Estimating Just-Noticeable Distortion for Video , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Evgeny Burnaev,et al. Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.
[9] Léon Bottou,et al. Wasserstein Generative Adversarial Networks , 2017, ICML.
[10] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[11] Guangming Shi,et al. Just Noticeable Difference Estimation for Images With Free-Energy Principle , 2013, IEEE Transactions on Multimedia.
[12] Ren Ng,et al. StegaStamp: Invisible Hyperlinks in Physical Photographs , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[13] Gang Wang,et al. Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.
[14] Samuel W. Hasinoff,et al. Photon, Poisson Noise , 2014, Computer Vision, A Reference Guide.
[15] Bui Tuong Phong. Illumination for computer generated pictures , 1975, Commun. ACM.
[16] Susu Yao,et al. Just noticeable distortion model and its applications in video coding , 2005, Signal Process. Image Commun..
[17] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[18] Richard Shin. JPEG-resistant Adversarial Images , 2017 .
[19] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[20] Yan Ke,et al. Generative steganography with Kerckhoffs’ principle , 2018, Multimedia Tools and Applications.
[21] Toshihiro Matsui,et al. Image Transformation can make Neural Networks more robust against Adversarial Examples , 2019, ArXiv.
[22] David Zhang,et al. FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.
[23] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[24] Zhou Wang,et al. Multiscale structural similarity for image quality assessment , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[25] Duen Horng Chau,et al. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector , 2018, ECML/PKDD.
[26] Li Fei-Fei,et al. Perceptual Losses for Real-Time Style Transfer and Super-Resolution , 2016, ECCV.
[27] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[28] Andrew Zisserman,et al. Spatial Transformer Networks , 2015, NIPS.
[29] Thomas Brox,et al. Generating Images with Perceptual Similarity Metrics based on Deep Networks , 2016, NIPS.
[30] Logan Engstrom,et al. Synthesizing Robust Adversarial Examples , 2017, ICML.
[31] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[32] Minqing Zhang,et al. Recent Advances of Image Steganography With Generative Adversarial Networks , 2019, IEEE Access.
[33] Dawn Song,et al. Physical Adversarial Examples for Object Detectors , 2018, WOOT @ USENIX Security Symposium.
[34] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[35] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[36] Guangming Shi,et al. Enhanced Just Noticeable Difference Model for Images With Pattern Complexity , 2017, IEEE Transactions on Image Processing.
[37] Sanjeev J. Koppal,et al. Lambertian Reflectance , 2020, Computer Vision, A Reference Guide.
[38] Manoranjan Paul,et al. Just Noticeable Difference for Images With Decomposition Model for Separating Edge and Textured Regions , 2010, IEEE Transactions on Circuits and Systems for Video Technology.
[39] Guangtao Zhai,et al. The Invisible QR Code , 2015, ACM Multimedia.
[40] Dwijendra K. Ray-Chaudhuri,et al. Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.