|
[1]
|
Mukherjee, S. and Sanyal, G. (2019) Edge Based Image Steganography with Variable Threshold. Multimedia Tools and Applications, 78, 16363-16388. [Google Scholar] [CrossRef]
|
|
[2]
|
Li, B., Tan, S., Ming, W., et al. (2014) Investigation on Cost Assignment in Spatial Image Steganography. IEEE Transactions on Information Forensics & Security, 9, 1264-1277. [Google Scholar] [CrossRef]
|
|
[3]
|
Tang, W., Tan, S., Li, B., et al. (2017) Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Processing Letters, 24, 1547-1551. [Google Scholar] [CrossRef]
|
|
[4]
|
Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., et al. (2014) Generative Adversarial Nets. International Conference on Neural Information Processing Systems, 2672-2680.
|
|
[5]
|
Tang, W., Li, B. and Tan, S. (2019) CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography. IEEE Transactions on Information Forensics and Security, 14, 2074-2087. [Google Scholar] [CrossRef]
|
|
[6]
|
Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 234-239. [Google Scholar] [CrossRef]
|
|
[7]
|
Fridrich, J. and Kodovsky, J. (2013) Multivariate Gaussian Model for Designing Additive Distortion for Steganography: 2013 IEEE International Conference on Acoustics, Vancouver, 2949-2953. [Google Scholar] [CrossRef]
|
|
[8]
|
Sedighi, V., Fridrich, J. and Cogranne, R. (2015) Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Proceedings of SPIE-The International Society for Optical Engineering, 9409, 1-13. [Google Scholar] [CrossRef]
|
|
[9]
|
Sedighi, V., Cogranne, R. and Fridrich, J. (2016) Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics & Security, 11, 221-234. [Google Scholar] [CrossRef]
|
|
[10]
|
Li, B., Ming, W., Huang, J., et al. (2015) A New Cost Function for Spatial Image Steganography. 2015 IEEE International Conference on Image Processing, Quebec City, Canada, 27-30 September 2015, 4206-4210.
|
|
[11]
|
Pevny, T., Bas, P. and Fridrich, J. (2010) Steganalysis by Subtractive Pixel Adja-cency Matrix. IEEE Transactions on Information Forensics & Security, 5, 215-224. [Google Scholar] [CrossRef]
|
|
[12]
|
Pevný, T. and Fridrich, J. (2008) Benchmarking for Steganography. [Google Scholar] [CrossRef]
|
|
[13]
|
郑传声. 基于最小化嵌入失真的空域图像隐写算法研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2018.
|
|
[14]
|
Li, B., Ming, W., Li, X., et al. (2015) A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Transactions on Information Forensics & Security, 10, 1905-1917. [Google Scholar] [CrossRef]
|
|
[15]
|
Subhedar, M.S. and Mankar, V.H. (2019) Image Steganography Us-ing Contourlet Transform and Matrix Decomposition Techniques. Multimedia Tools and Applications, 78, 22155-22181. [Google Scholar] [CrossRef]
|
|
[16]
|
张立国, 王松, 金梅, 等. 基于多尺度感知哈希特征的目标跟踪算法研究[J]. 高技术通讯, 2018, 28(3): 39-46.
|
|
[17]
|
Ker, A.D. (2009) Estimating Steganographic Fisher Information in Real Images. In: Katzenbeisser, S. and Sadeghi, A.R., Eds., Information Hiding. IH 2009. Lecture Notes in Computer Science, Volume 5806, Springer, Berlin, Heidelberg, 73-88. [Google Scholar] [CrossRef]
|
|
[18]
|
Bas, P., Filler, T. and Pevný, T. (2011) Break Our Steganographic System: The Ins and Outs of Organizing BOSS. In: Proceedings of International Conference on Information Hiding, Prague, Czech Republi, Springer-Verlag, Berlin, 58-70. [Google Scholar] [CrossRef]
|
|
[19]
|
Kodovský, J. and Fridrich, J. (2012) Rich Models for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 7, 868-882. [Google Scholar] [CrossRef]
|
|
[20]
|
Denemark, T., Sedighi, V., Holub, V., et al. (2014) Selection-Channel-Aware Rich Model for Steganalysis of Digital Images. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 48-53. [Google Scholar] [CrossRef]
|
|
[21]
|
Kodovský, J., Fridrich, J. and Holub, V. (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics & Security, 7, 432-444. [Google Scholar] [CrossRef]
|
|
[22]
|
Abdulla, A.A., Sellahewa, H. and Jassim, S.A. (2019) Improving Embedding Efficiency for Digital Steganography by Exploiting Similarities between Secret and Cover Images. Multi-media Tools and Applications, 78, 17799-17823. [Google Scholar] [CrossRef]
|