Steganography using a 3 player game
暂无分享,去创建一个
[1] Bin Li,et al. CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.
[2] Feng Zhu,et al. Efficient feature learning and multi-size image steganalysis based on CNN , 2018, ArXiv.
[3] Bolin Chen,et al. Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.
[4] Li Fei-Fei,et al. HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.
[5] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[6] Patrick Bas,et al. Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain , 2019, IH&MMSec.
[7] Rainer Böhme,et al. Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.
[8] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[9] Marc Chaumont,et al. Deep learning in steganography and steganalysis , 2020 .
[10] Marc Chaumont,et al. Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[11] Marc Chaumont,et al. Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Martín Abadi,et al. Learning to Protect Communications with Adversarial Neural Cryptography , 2016, ArXiv.
[13] Rainer Böhme,et al. A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.
[14] Bin Li,et al. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.
[15] Bin Li,et al. Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.
[16] Bin Li,et al. ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.
[17] Jessica Fridrich. Steganography in Digital Media: Preface , 2009 .
[18] Rainer Böhme,et al. Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[19] Marc Chaumont,et al. Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis , 2020, IH&MMSec.
[20] Marc Chaumont,et al. How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.
[21] Jessica J. Fridrich,et al. Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.
[22] David Megías,et al. Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..
[23] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[24] Thomas Brox,et al. U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.
[25] Jianyi Liu,et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.
[26] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[27] Gustavus J. Simmons,et al. The Subliminal Channel and Digital Signature , 1985, EUROCRYPT.
[28] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[29] George Danezis,et al. Generating steganographic images via adversarial training , 2017, NIPS.
[30] Marc Chaumont,et al. Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.
[31] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[32] Simmons,et al. The Subliminal Channel and Digital Signatures , 2022 .
[33] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[34] Andrew L. Maas. Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .
[35] Mo Chen,et al. Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.
[36] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.