Residual convolution network based steganalysis with adaptive content suppression
暂无分享,去创建一个
[1] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.
[2] Chia-Hung Yeh,et al. Data hiding domain classification for blind image steganalysis , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[3] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[4] Yan Liu,et al. Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.
[5] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[6] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[7] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[8] Yun Q. Shi,et al. Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.
[9] Kien A. Hua,et al. Field Effect Deep Networks for Image Recognition with Incomplete Data , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[10] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[11] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[13] Jessica J. Fridrich,et al. Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[14] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[15] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[16] Yan Liu,et al. Steganalysis via Deep Residual Network , 2016, 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS).
[17] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[18] Jing Long,et al. Query-oriented unsupervised multi-document summarization via deep learning model , 2015, Expert Syst. Appl..
[19] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[20] Bin Li,et al. Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.
[21] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.