[1]Luo Weiqi,Huang Fangjun,Huang Jinwu. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Trans on Information Forensics and Security,2010,5(2):201-214
[2]Chandramouli R,Memon Nasir. Analysis of LSB based image steganography techniques[C]// Proc of the 2001 Int Conf on Image Processing. Piscataway,NJ:IEEE,2001:1019-1022
[3]Thangadurai K,Sudha Devin G. An analysis of lsb based image steganography techniques[C]//Proc of Int Conf on Computer Communication and Informatics. Piscataw,NJ:IEEE,2014
[4] Lou Derchyuan,Liu Jianglung,Chang Mingchang. Digital watermarking using multiresolution wavelet transform[C]//Proc of IEEE Int Cainahan Conf on Security Technology. Piscataway, NJ:IEEE,2003:370-377
[5] Amir Farhad Nilizadeh,Ahmad Reza Naghsh Nilchi. Steganography on RGB Images based on a“matrix pattern” using random blocks[J/OL]. 2013,4(2):8-18[2019-02-22]. http://www.mecs-press.org/
[6] Amirfarhad Nilizadeh,Wojciech Mazurczyk,Cliff Zou, et al. Information hiding in RGB images using an improved matrix pattern approach[C]// Proc of IEEE Conf on Computer Vision and Pattern Recognition Workshops. Piscataway,NJ:IEEE,2017:1407-1415
[7] Zaker Nazanin,Hamzeh Ali, Seraj Dean Katebi,et al. Improving security of pixel value differencing steganographic method[C]// Proc of Int Conf on New Technology. Piscataway,NJ:IEEE,2009
[8] Amirfarhad Nilizadeh,Ahmad Reza Naghsh Nilchi. A novel steganography method based on matrix pattern and LSB algorithms in RGB images[C]// Proc of the 1st Conf on Swarm Intelligence and Evolutionary Computation. Piscataway,NJ:IEEE,2016:154-160
[9]Wu Dachun, Tsai Wenhsiang. A steganographic method for images by pixel-value differencing[J]. Pattern Recognition Letters,2002,24 (2003):1613–1626
[10] Yuan Ziqian,Guan Zijie,Feng Hao. An improved information hiding algorithm based on image[C]// Proc of IEEE Int Conf on Software. Piscataw,NJ:IEEE,2017:169-172
[11] Barni M. Steganography in digital media: principles, algorithms, and applications (Fridrich, J. 2010) book reviews[J]. IEEE Signal Proc Magazine,2011,28(5):142–144
[12] Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. Cambridge:Cambridge University Press,2009:1–20
[13] Zhou Zhili,Cao Yi,Sun Xingming. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Science- Electronics and Information Engineering,2016, 34(5):527–536
[14]Zhou Zhili,Sun Huiyu, Harit Rohan,et al. Coverless image steganography without embedding[C]// Proc of Int Conf on Cloud Computing and Security. Berlin:Springer,2015:123–132
[15] Zheng Shuili,Wang Liang,Ling Baohong,et al. Coverless information hiding based on robust image hashing[C]// Proc of Int Conf on Intelligent Computing Methodologies. Switzerland:Springer,2017:536–547
[16] Xu Jiayi,Mao Xiaoyang,Jin Xiaogang,et al. Hidden message in a deformation-based texture[J]. The Visual Computer,2015,31(12):1653–1669
[17] Wu Kuochen,Wang Chungming. Steganography using reversible texture synthesis[J]. IEEE Trans Image Processing,2015,24(1):130–139
[18] Goodfellow L,Pouget Abadie J,Mirza M,et al. Generative adversarial nets[OL]. (2014-06-11)[2018-12-25]. https://arxiv.org/abs/1406.2661
[19]Mirza M,Osindero S. Conditional generative adversarial nets[OL]. (2014-11-06)[2018-12-25]. http://arxiv.org/abs/1411.1784
[20]Radford A,Metz L,Chintala S. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks [OL].(2015-11-09)[2018-12-25]. https://arxiv.org/abs/1511.06434