[1]蒋明, 张宗凯, 刘熙尧, 等. 基于多注意力机制的孪生网络图像隐写分析方法[J]. 信息安全研究, 2023, 9(6): 573579[2]Fridrich J, Kodovsky J. Rich models for steganalysis of digital images[J]. IEEE Trans on Information Forensics and Security, 2012, 7(3): 868882[3]Tan S, Li B. Stacked convolutional autoencoders for steganalysis of digital images[C] Proc of Signal and Information Processing Association Annual Summit and Conference (APSIPA). Piscataway, NJ: IEEE, 2014: 14[4]Pevn T, Filler T, Bas P. Using highdimensional image models to perform highlyun detectable steganography[C] Proc of Int Workshop on Information Hiding. Berlin: Springer, 2010: 161177[5]Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks[G] SPIE 9409: Media Watermarking, Security, and Forensics 2015. Bellingham, WA: SPIE, 2015: 171180[6]Ye J, Ni J, Yi Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Trans on Information Forensics and Security, 2017, 12(11): 25452557[7]Boroumand M, Chen M, Fridrich J. Deep residual network for steganalysis of digital images[J]. IEEE Trans on Information Forensics and Security, 2018, 14(5): 11811193[8]Zhang R, Zhu F, Liu J, et al. Depthwise separable convolutions and multilevel pooling for an efficient spatial CNNbased steganalysis[J]. IEEE Trans on Information Forensics and Security, 2019, 15: 11381150[9]Sobel I, Feldman G. A 3×3 isotropic gradient operator for image processing[EBOL]. 1968 [20250312]. https:www.researchgate.netpublication285159837_A_33_isotropic_gradient_operator_for_image_processing[10]Fu D, Xu L. Satellite cloud image texture feature extraction based on Gabor wavelet[C] Proc of the 4th Int Congress on Image and Signal Processing. Piscataway, NJ: IEEE, 2011: 248251[11]Hu J, Shen L, Sun G. Squeezeandexcitation networks[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2018: 71327141[12]Chollet F. Xception: Deep learning with depthwise separable convolutions[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2017: 12511258[13]Howard A G, Zhu M, Chen B, et al. Mobilenets: Efficient convolutional neural networks for mobile vision applications[J]. arXiv preprint, arXiv:1704.04861, 2017[14]Bas P, Filler T, Pevn T. “Break our steganographic system”: The ins and outs of organizing BOSS[C] Proc of Int Workshop on Information Hiding. Berlin: Springer, 2011: 5970[15]Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014, 2014: 113[16]Holub V, Fridrich J. Designing steganographic distortion using directional filters[C] Proc of 2012 IEEE Int Workshop on Information Forensics and Security (WIFS). Piscataway, NJ: IEEE, 2012: 234239[17]Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Trans on Information Forensics and Security, 2010, 5(4): 705720
|