|
[1]
|
Malik, A.S., Boyko, O., Aktar, N. and Young, W.F. (2001) A Comparative Study of MR Imaging Profile of Titanium Pedicle Screws. Acta Radiologica, 42, 291-293. [Google Scholar] [CrossRef] [PubMed]
|
|
[2]
|
Fridrich, J., Goljan, M. and Rui Du, (2001) Detecting LSB Steganography in Color, and Gray-Scale Images. IEEE Multimedia, 8, 22-28. [Google Scholar] [CrossRef]
|
|
[3]
|
Lerch-Hostalot, D. and Megías, D. (2016) Unsupervised Steganalysis Based on Artificial Training Sets. Engineering Applications of Artificial Intelligence, 50, 45-59. [Google Scholar] [CrossRef]
|
|
[4]
|
Luo, W., Huang, F. and Huang, J. (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5, 201-214. [Google Scholar] [CrossRef]
|
|
[5]
|
Pan, F., Li, J. and Yang, X. (2011) Image Steganography Method Based on PVD and Modulus Function. 2011 International Conference on Electronics, Communications and Control (ICECC), Ningbo, 9-11 September 2011, 282-284. [Google Scholar] [CrossRef]
|
|
[6]
|
Ruanaidh, J.J.K.O., Dowling, W.J. and Boland, F.M. (1996) Phase Watermarking of Digital Images. Proceedings of 3rd IEEE International Conference on Image Processing, Lausanne, 19 September 1996, 239-242. [Google Scholar] [CrossRef]
|
|
[7]
|
Hsu, C.-T. and Wu, J.-L. (1999) Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing, 8, 58-68. [Google Scholar] [CrossRef] [PubMed]
|
|
[8]
|
Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet-Based Watermarking through Pixel-Wise Masking. IEEE Transactions on Image Processing, 10, 783-791. [Google Scholar] [CrossRef] [PubMed]
|
|
[9]
|
Hayes, J. and Danezis, G. (2017) Generating Steganographic Images via Adversarial Training. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, 4-9 December 2017, 1951-1960.
|
|
[10]
|
Volkhonskiy, D., Borisenko, B. and Burnaev, E. (2016) Generative Adversarial Networks for Image Steganography. https://openreview.net/pdf?id=H1hoFU9xe
|
|
[11]
|
Shi, H., Dong, J., Wang, W., Qian, Y. and Zhang, X. (2017) SSGAN: Secure Steganography Based on Generative Adversarial Networks. Advances in Multimedia Information Processing—PCM 2017, Harbin, 28-29 September 2017, 534-544. [Google Scholar] [CrossRef]
|
|
[12]
|
Tang, W., Tan, S., Li, B. and Huang, J. (2017) Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Processing Letters, 24, 1547-1551. [Google Scholar] [CrossRef]
|
|
[13]
|
Zhang, K.A., Cuesta-Infante, A., Xu, L., et al. (2019) SteganoGAN: High Capacity Image Steganography with GANs. arXiv: 1901.03892. [Google Scholar] [CrossRef]
|
|
[14]
|
Zhu, J., Kaplan, R., Johnson, J. and Fei-Fei, L. (2018) HiDDeN: Hiding Data with Deep Networks. Computer Vision—ECCV 2018, Munich, 8-14 September 2018, 682-697. [Google Scholar] [CrossRef]
|
|
[15]
|
Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S. and Emami, A. (2020) ReDMark: Framework for Residual Diffusion Watermarking Based on Deep Networks. Expert Systems with Applications, 146, Article 113157. [Google Scholar] [CrossRef]
|
|
[16]
|
Tancik, M., Mildenhall, B. and Ng, R. (2020) StegaStamp: Invisible Hyperlinks in Physical Photographs. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, 13-19 June 2020, 2114-2123. [Google Scholar] [CrossRef]
|
|
[17]
|
Luo, X., Zhan, R., Chang, H., Yang, F. and Milanfar, P. (2020) Distortion Agnostic Deep Watermarking. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, 13-19 June 2020, 13545-13554. [Google Scholar] [CrossRef]
|
|
[18]
|
Baluja, S. (2017) Hiding Images in Plain Sight: Deep Steganography. Proceedings of the 31st International Conference on Neural Information Processing Systems, Long Beach, 4-9 December 2017, 2066-2076.
|
|
[19]
|
Weng, X., Li, Y., Chi, L. and Mu, Y. (2019) High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. Proceedings of the 2019 on International Conference on Multimedia Retrieval, Ottawa, 10-13 June 2019, 87-95. [Google Scholar] [CrossRef]
|
|
[20]
|
Wu, P., Yang, Y. and Li, X. (2018) Image-into-Image Steganography Using Deep Convolutional Network. Advances in Multimedia Information Processing—PCM 2018, Hefei, 21-22 September 2018, 792-802. [Google Scholar] [CrossRef]
|
|
[21]
|
Wu, P., Yang, Y. and Li, X. (2018) StegNet: Mega Image Steganography Capacity with Deep Convolutional Network. Future Internet, 10, Article 54. [Google Scholar] [CrossRef]
|
|
[22]
|
Baluja, S. (2020) Hiding Images within Images. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42, 1685-1697. [Google Scholar] [CrossRef] [PubMed]
|
|
[23]
|
Das, A., Wahi, J.S., Anand, M., et al. (2021) Multi-Image Steganography Using Deep Neural Networks. arXiv: 2101.00350. [Google Scholar] [CrossRef]
|
|
[24]
|
Lu, S., Wang, R., Zhong, T. and Rosin, P.L. (2021) Large-Capacity Image Steganography Based on Invertible Neural Networks. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, 20-25 June 2021, 10811-10820. [Google Scholar] [CrossRef]
|
|
[25]
|
Dinh, L., Krueger, D. and Bengio, Y. (2014) NICE: Non-Linear Independent Components Estimation. arXiv: 1410.8516. [Google Scholar] [CrossRef]
|
|
[26]
|
Dinh, L., Sohl-Dickstein, J. and Bengio, S. (2016) Density Estimation Using Real NVP. arXiv: 1605.08803. [Google Scholar] [CrossRef]
|
|
[27]
|
Kingma, D.P. and Dhariwal, P. (2018) Glow: Generative Flow with Invertible 1x1 Convolutions. arXiv: 1807.03039. [Google Scholar] [CrossRef]
|
|
[28]
|
van der Ouderaa, T.F.A. and Worrall, D.E. (2019) Reversible GANs for Memory-Efficient Image-to-Image Translation. 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, 15-20 June 2019, 4715-4723. [Google Scholar] [CrossRef]
|
|
[29]
|
Ardizzone, L., Lüth, C., Kruse, J., et al. (2019) Guided Image Generation with Conditional Invertible Neural Networks. arXiv: 1907.02392. [Google Scholar] [CrossRef]
|
|
[30]
|
Xiao, M., Zheng, S., Liu, C., Wang, Y., He, D., Ke, G., et al. (2020) Invertible Image Rescaling. Computer Vision—ECCV 2020, Glasgow, 23-28 August 2020, 126-144. [Google Scholar] [CrossRef]
|
|
[31]
|
Lugmayr, A., Danelljan, M., Van Gool, L. and Timofte, R. (2020) SRFlow: Learning the Super-Resolution Space with Normalizing Flow. Computer Vision—ECCV 2020, Glasgow, 23-28 August 2020, 715-732. [Google Scholar] [CrossRef]
|
|
[32]
|
Wang, Y., Xiao, M., Liu, C., et al. (2020) Modeling Lost Information in Lossy Image Compression. arXiv: 2006.11999. [Google Scholar] [CrossRef]
|
|
[33]
|
Liu, Y., Qin, Z., Anwar, S., Ji, P., Kim, D., Caldwell, S., et al. (2021) Invertible Denoising Network: A Light Solution for Real Noise Removal. 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, 20-25 June 2021, 13360-13369. [Google Scholar] [CrossRef]
|
|
[34]
|
Al-Husainy, M.A.F. and Uliyan, D.M. (2019) A Secret-Key Image Steganography Technique Using Random Chain Codes. International Journal of Technology, 10, 731-740. [Google Scholar] [CrossRef]
|
|
[35]
|
Almazaydeh, W.I.A. and Sheshadri, H.S. (2018) Image Steganography Using a Dynamic Symmetric Key. 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, 11-12 May 2018, 1507-1513. [Google Scholar] [CrossRef]
|
|
[36]
|
Masud Karim, S.M., Rahman, M.S. and Hossain, M.I. (2011) A New Approach for LSB Based Image Steganography Using Secret Key. 14th International Conference on Computer and Information Technology (ICCIT 2011), Dhaka, 22-24 December 2011, 286-291. [Google Scholar] [CrossRef]
|
|
[37]
|
Kweon, H., Park, J., Woo, S. and Cho, D. (2021) Deep Multi-Image Steganography with Private Keys. Electronics, 10, Article 1906. [Google Scholar] [CrossRef]
|
|
[38]
|
Li, J., Wen, Y. and He, L. (2023) SCConv: Spatial and Channel Reconstruction Convolution for Feature Redundancy. 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, 17-24 June 2023, 6153-6162. [Google Scholar] [CrossRef]
|
|
[39]
|
Agustsson, E. and Timofte, R. (2017) NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, 21-26 July 2017, 1122-1131. [Google Scholar] [CrossRef]
|
|
[40]
|
Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., et al. (2015) ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision, 115, 211-252. [Google Scholar] [CrossRef]
|
|
[41]
|
Lin, T., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., et al. (2014) Microsoft COCO: Common Objects in Context. Computer Vision—ECCV 2014, Zurich, 6-12 September 2014, 740-755. [Google Scholar] [CrossRef]
|
|
[42]
|
Kingma, D.P. and Ba, J. (2014) Adam: A Method for Stochastic Optimization. arXiv: 1412.6980. [Google Scholar] [CrossRef]
|