[1] Ye Jian, Ni Jiangqun, Yi Yang.Deep learning hierarchical representations for image steganalysis [J]. IEEE Trans on Information Forensics and Security, 2017, 12(11): 2545-2557
[2] Ruan Feng, Zhang Xing, Zhu Dawei, et al. Deep learning for real-time image steganalysis: A survey[J]. Journal of Real-Time Image Processing, 2020, 17(1): 149-160
[3] Wang Ze, Chen Mingzhi, Yang Yu, et al. Joint multi-domain feature learning for image steganalysis based on CNN[J]. EURASIP Journal on Image and Video Processing, 2020, 2020(1): 1-12
[4] Yang Chenghsing, Weng Chiyao, Wang Shuihjeng, et al. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Trans on Information Forensics and Security, 2008, 3(3): 488-497
[5] Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C] //Proc of the International Workshop on Information Hiding.Piscataway, NJ: IEEE, 2010: 161-177
[6] Holub V, Fridrich J. Designing steganographic distortion using directional filters[C] // Proc of the 2012 IEEE Int Workshop on Information Forensics and Security (WIFS).Piscataway, NJ: IEEE, 2012: 234-239
[7] Holub V, Fridrich J. Digital image steganography using universal distortion[C] //Proc of the 1st ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013: 59-68
[8] Li Bin, Tan Shunquan, Wang Ming, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Trans on Information Forensics and Security, 2014, 9(8): 1264-1277
[10] Chen Wenyuan. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation[J]. Applied Mathematics and Computation, 2007, 185(1): 432-448
[11] McKeon R T. Strange Fourier steganography in movies[C] //Proc of the 2007 IEEE Int Conf on Electro/Information Technology. Piscataway, NJ: IEEE, 2007: 178-182
[12] Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997, 6(12): 1673-1687
[13] Valandar M Y, Ayubi P, Barani M J. A new transform domain steganography based on modified logistic chaotic map for color images[J]. Journal of Information Security and Applications, 2017, 34: 142-151
[14] Bilal M, Imtiaz S, Abdul W, et al. Zero-steganography using DCT and spatial domain[C] //Proc of the 2013 ACS Int Conf on Computer Systems and Applications (AICCSA). Piscataway, NJ: IEEE, 2013: 1-7
[15] Zhou Zhili, Cao Yi, Sun Xingming. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5): 527-536
[16] Pan Nan, Qin Jiaohua, Tan Yun, et al. A video coverless information hiding algorithm based on semantic segmentation[J]. EURASIP Journal on Image and Video Processing, 2020, 2020(1): 1-18
[17] Zheng Shuli, Wang Liang, Ling Baohong, et al. Coverless information hiding based on robust image hashing[C] //Proc of International Conference on Intelligent Computing.Berlin:springer,2017:536-547
[18] Duan Xintao, Song Haoxian. Coverless information hiding based on generative model[J]. arXiv preprint, arXiv:1802.03528, 2018
[19] Hu Donghui, Wang Liang, Jiang Wenjie, et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018, 6: 38303-38314
[20] Zhou Zhili, Cao Yi, Sun Xingming. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5): 527-536
|