Hiding Images in Plain Sight: Deep Steganography
暂无分享,去创建一个
[1] Jing Dong,et al. Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.
[2] Chuohao Yeo,et al. Intrinsic images decomposition using a local and global sparse representation of reflectance , 2011, CVPR 2011.
[3] V. Kavitha,et al. Neural Based Steganography , 2004, PRICAI.
[4] Shawn D. Dickman. An Overview of Steganography , 2007 .
[5] Robert Jarusek,et al. Neural Network Approach to Image Steganography Techniques , 2015, MENDEL.
[6] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[7] Haitham Badi,et al. Artificial neural network for steganography , 2014, Neural Computing and Applications.
[8] Omaima N. A. AL-Allaf,et al. Hiding an Image inside another Image using Variable-Rate Steganography , 2013 .
[9] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[10] T. Ens,et al. Blind signal separation : statistical principles , 1998 .
[11] Benedikt Boehm,et al. StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.
[12] Mostafa Rahmani,et al. Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm , 2012 .
[13] Nasir D. Memon,et al. Steganalysis of audio based on audio quality metrics , 2003, IS&T/SPIE Electronic Imaging.
[14] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[15] Bhupendra Verma,et al. Neural network based steganography algorithm for still images , 2010, INTERACT-2010.
[16] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[17] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[18] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[19] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[20] Mansour Jamzad,et al. Estimating Watermarking Capacity in Gray Scale Images Based on Image Complexity , 2010, EURASIP J. Adv. Signal Process..
[21] Marc Chaumont,et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2016, Media Watermarking, Security, and Forensics.
[22] Gary C. Kessler,et al. An Overview of Steganography for the Computer Forensics Examiner , 2004 .
[23] Pascal Vincent,et al. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion , 2010, J. Mach. Learn. Res..
[24] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[25] Terrence J. Sejnowski,et al. The “independent components” of natural scenes are edge filters , 1997, Vision Research.
[26] Jessica J. Fridrich,et al. Breaking HUGO - The Process Discovery , 2011, Information Hiding.
[27] George Danezis,et al. ste-GAN-ography: Generating Steganographic Images via Adversarial Training , 2017, ArXiv.
[28] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[29] A. S. Brandão,et al. Artificial Neural Networks Applied to Image Steganography , 2016, IEEE Latin America Transactions.