|
[1]
|
Zhong, N., Qian, Z., Wang, Z., Zhang, X. and Li, X. (2021) Batch Steganography via Generative Network. IEEE Transactions on Circuits and Systems for Video Technology, 31, 88-97. [Google Scholar] [CrossRef]
|
|
[2]
|
Verma, V., Muttoo, S.K. and Singh, V.B. (2022) Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in Windows. In: Rao, U.P., Patel, S.J., Raj, P. and Visconti, A., Eds., Security, Privacy and Data Analytics, Springer, 103-116. [Google Scholar] [CrossRef]
|
|
[3]
|
Tan, S. and Li, B. (2014) Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images. Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, Siem Reap, 9-12 December 2014, 1-4. [Google Scholar] [CrossRef]
|
|
[4]
|
Qian, Y., Dong, J., Wang, W. and Tan, T. (2015) Deep Learning for Steganalysis via Convolutional Neural Networks. SPIE Proceedings, 9409, Article ID: 94090J. [Google Scholar] [CrossRef]
|
|
[5]
|
Xu, G., Wu, H. and Shi, Y. (2016) Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Processing Letters, 23, 708-712. [Google Scholar] [CrossRef]
|
|
[6]
|
Ye, J., Ni, J. and Yi, Y. (2017) Deep Learning Hierarchical Representations for Image Steganalysis. IEEE Transactions on Information Forensics and Security, 12, 2545-2557. [Google Scholar] [CrossRef]
|
|
[7]
|
Yedroudj, M., Comby, F. and Chaumont, M. (2018) Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, 15-20 April 2018, 2092-2096. [Google Scholar] [CrossRef]
|
|
[8]
|
Boroumand, M., Chen, M. and Fridrich, J. (2019) Deep Residual Network for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 14, 1181-1193. [Google Scholar] [CrossRef]
|
|
[9]
|
Cancelli, G., Doerr, G., Barni, M. and Cox, I.J. (2008) A Comparative Study of ± Steganalyzers. 2008 IEEE 10th Workshop on Multimedia Signal Processing, Cairns, 8-10 October 2008, 791-796. [Google Scholar] [CrossRef]
|
|
[10]
|
Kodovský, J., Sedighi, V. and Fridrich, J. (2014) Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate Its Impact. SPIE Proceedings, 9028, Article ID: 90280J. [Google Scholar] [CrossRef]
|
|
[11]
|
Pan, S.J. and Yang, Q. (2010) A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering, 22, 1345-1359. [Google Scholar] [CrossRef]
|
|
[12]
|
Zhang, X., Kong, X., Wang, P. and Wang, B. (2020) Cover-Source Mismatch in Deep Spatial Steganalysis. In: Wang, H., Zhao, X., Shi, Y., Kim, H. and Piva, A., Eds., Digital Forensics and Watermarking, Springer, 71-83. [Google Scholar] [CrossRef]
|
|
[13]
|
Yu, L., Weng, S., Chen, M. and Wei, Y. (2024) RCDD: Contrastive Domain Discrepancy with Reliable Steganalysis Labeling for Cover Source Mismatch. Expert Systems with Applications, 237, Article ID: 121543. [Google Scholar] [CrossRef]
|
|
[14]
|
Weng, S., Zhang, Z., Yu, L., Cao, P. and Cao, G. (2024) Universal Mismatched Steganalysis Equipped with Progressive Intermediate Domains. IEEE Signal Processing Letters, 31, 800-804. [Google Scholar] [CrossRef]
|
|
[15]
|
Li, Y., Yu, L., Weng, S., Tian, H. and Cao, G. (2023) Discriminability-Aware Intermediate Domains for Mismatched Steganalysis. Journal of LaTeX Class Files, 14, 1-8.
|
|
[16]
|
Cogranne, R., Giboulot, Q. and Bas, P. (2019) The ALASKA Steganalysis Challenge: A First Step towards Steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, 3-5 July 2019, 125-137. [Google Scholar] [CrossRef]
|
|
[17]
|
Bas, P., Filler, T. and Pevný, T. (2011) “Break Our Steganographic System”: The Ins and Outs of Organizing Boss. In: Filler, T., Pevný, T., Craver, S. and Ker, A., Eds., Information Hiding, Springer, 59-70. [Google Scholar] [CrossRef]
|
|
[18]
|
Huiskes, M.J. and Lew, M.S. (2008) The MIR Flickr Retrieval Evaluation. Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, Vancouver, 30-31 October 2008, 39-43. [Google Scholar] [CrossRef]
|
|
[19]
|
Holub, V., Fridrich, J. and Denemark, T. (2014) Universal Distortion Function for Steganography in an Arbitrary Domain. EURASIP Journal on Information Security, 2014, Article No. 1. [Google Scholar] [CrossRef]
|
|
[20]
|
Li, B., Wang, M., Huang, J. and Li, X. (2014) A New Cost Function for Spatial Image Steganography. 2014 IEEE International Conference on Image Processing (ICIP), Paris, 27-30 October 2014, 4206-4210. [Google Scholar] [CrossRef]
|
|
[21]
|
Sedighi, V., Cogranne, R. and Fridrich, J. (2016) Content-adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, 11, 221-234. [Google Scholar] [CrossRef]
|
|
[22]
|
Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Costa Adeje, 2-5 December 2012, 234-239. [Google Scholar] [CrossRef]
|
|
[23]
|
Golner, M.A., Mikhael, W.B., Krishnan, V. and Ramaswamy, A. (2000) Region Based Variable Quantization for JPEG Image Compression. Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems (Cat.No.CH37144), Lansing, 8-11 August 2000, 604-607. [Google Scholar] [CrossRef]
|
|
[24]
|
Guo, L., Ni, J., Su, W., Tang, C. and Shi, Y. (2015) Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Transactions on Information Forensics and Security, 10, 2669-2680. [Google Scholar] [CrossRef]
|
|
[25]
|
Xue, Y., Yang, L., Wen, J., Niu, S. and Zhong, P. (2018) A Subspace Learning-Based Method for JPEG Mismatched Steganalysis. Multimedia Tools and Applications, 78, 8151-8166. [Google Scholar] [CrossRef]
|