|
[1]
|
Xian, Y., Wang, X., Zhang, Y., Wang, X. and Du, X. (2021) Fractal Sorting Vector-Based Least Significant Bit Chaotic Permutation for Image Encryption. Chinese Physics B, 30, Article ID: 060508. [Google Scholar] [CrossRef]
|
|
[2]
|
Duan, X., Jia, K., Li, B., Guo, D., Zhang, E. and Qin, C. (2019) Reversible Image Steganography Scheme Based on a U-Net Structure. IEEE Access, 7, 9314-9323. [Google Scholar] [CrossRef]
|
|
[3]
|
Ronneberger, O., Fischer, P. and Brox, T. (2015) U-Net: Convolutional Networks for Biomedical Image Segmentation. In: Navab, N., Hornegger, J., Wells, W. and Frangi, A., Eds., Medical Image Computing and Computer-Assisted Intervention—MICCAI 2015, Springer International Publishing, 234-241. [Google Scholar] [CrossRef]
|
|
[4]
|
Zhang, R., Dong, S. and Liu, J. (2018) Invisible Steganography via Generative Adversarial Networks. Multimedia Tools and Applications, 78, 8559-8575. [Google Scholar] [CrossRef]
|
|
[5]
|
Hayes, J. and Danezis, G. (2017) Generating Steganographic Images via Adversarial Training. Proceedings of the 31st Annual Conference on Neural Information Processing Systems, La Jolla, 1955-1964.
|
|
[6]
|
Hu, D., Wang, L., Jiang, W., Zheng, S. and Li, B. (2018) A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. IEEE Access, 6, 38303-38314. [Google Scholar] [CrossRef]
|
|
[7]
|
Agustsson, E. and Timofte, R. (2017) NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, 21-26 July 2017, 1122-1131. [Google Scholar] [CrossRef]
|
|
[8]
|
Ardizzone, L., Kruse, J., Rother, C. and Kothe, U. (2018) Analyzing Inverse Problems with Invertible Neural Networks. arXiv: 1808.04730.
|
|
[9]
|
Baluja, S. (2017) Hiding Images in Plain Sight: Deep Steganography. In: Guyon, I., Von Luxburg, U., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S. and Garnett, R., Eds., Advances in Neural Information Processing Systems 30, (NeurIPS).
|
|
[10]
|
Baluja, S. (2019) Hiding Images within Images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42, 1685-1697.
|
|
[11]
|
Dinh, L., Sohl-Dickstein, J. and Bengio, S. (2016) Density Estimation Using Real NVP. arXiv: 1605.08803.
|
|
[12]
|
Gilbert, A., Zhang, Y., Lee, K., Zhang, Y. and Lee, H. (2017) Towards Understanding the Invertibility of Convolutional Neural Networks. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, Melbourne, 19-25 August 2017, 1703-1710. [Google Scholar] [CrossRef]
|
|
[13]
|
Baluja, S. (2017) Hiding Images in Plain Sight: Deep Steganography. In: Guyon, I., Von Luxburg, U., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S. and Garnett, R., Eds., Advances in Neural Information Processing Systems 30, (NeurIPS).
|
|
[14]
|
He, J.W., Dong, C. and Qiao, Y. (2020) Interactive Multi-Dimension Modulation with Dynamic Controllable Residual Learning for Image Restoration. arXiv: 1912.05293.
|
|
[15]
|
Hetzl, S. and Mutzel, P. (2005) A Graph-Theoretic Approach to Steganography. In: Dittmann, J., Katzenbeisser, S. AND Uhl, A., Eds., Communications and Multimedia Security, Springer Berlin Heidelberg, 119-128. [Google Scholar] [CrossRef]
|
|
[16]
|
Zhu, J., Kaplan, R., Johnson, J. and Fei-Fei, L. (2018) HiDDeN: Hiding Data with Deep Networks. In: Ferrari, V., Hebert, M., Sminchisescu, C. and Weiss, Y., Eds., Computer Vision—ECCV 2018, Springer International Publishing, 682-697. [Google Scholar] [CrossRef]
|
|
[17]
|
Ho, J., Chen, X., Srinivas, A., et al. (2019) Flow++: Improving Flow-Based Generative Models with Variational Dequantization and Architecture Design. International Conference on Machine Learning (ICML), 3.
|
|
[18]
|
Huang, C.W., Krueger, D., Lacoste, A. and Courville, A. (2018) Neural Autoregressive Flows. arXiv: 1804.00779.
|