[1]张玉清. 人工智能的安全风险与隐私保护[J]. 信息安全研究, 2023, 9(6): 498499[2]Mielikainen J. LSB matching revisited[J]. IEEE Signal Processing Letters, 2006, 13(5): 285287[3]Ernawan F, Ariatmanto D. An efficient adaptive scaling factor for 4×4 DCT image watermarking[J]. Multimedia Tools and Applications, 2023, 82(6): 86038621[4]Thanki R, Borra S. A color image steganography in hybrid FRTDWT domain[J]. Journal of Information Security and Applications, 2018, 40: 92102[5]Goodfellow I, PougetAbadie J, Mirza M, et al. Generative adversarial nets[J]. Advances in Neural Information Processing Systems, 2014, 27: 26722680[6]Wang Z, Zhang Z, Jiang J. Multifeature fusion based image steganography using GAN[C] Proc of 2021 IEEE Int Symp on Software Reliability Engineering Workshops (ISSREW). Piscataway, NJ: IEEE, 2021: 280281[7]Yuan C, Wang H, He P, et al. GANbased image steganography for enhancing security via adversarial attack and pixelwise deep fusion[J]. Multimedia Tools Applications, 2022, 81(5): 66816701[8]Zha H, Zhang W, Yu N, et al. Enhancing image steganography via adversarial optimization of the stego distribution[J]. Signal Processing, 2023, 212: 109155[9]屈梦楠, 靳宇浩, 邬江. 基于隐式对称生成对抗网络的图像隐写与提取方案[J]. 信息安全研究, 2023, 9(6): 566572[10]Baluja S. Hiding images in plain sight: Deep steganography[J]. Advances in Neural Information Processing Systems, 2017, 30: 20662076[11]Zhu X, Lai Z, Liang Y, et al. Generative highcapacity image hiding based on residual CNN in wavelet domain[J]. Applied Soft Computing, 2022, 115: 108170[12]Yang J, Shang F, Liao Y, et al. Toward high capacity and robust JPEG steganography based on adversarial training[J]. Security and Communication Networks, 2023 (1): 3813977[13]Chen F, Xing Q, Sun B, et al. An enhanced steganography network for concealing and protecting secret image data[J]. Entropy, 2022, 24(9): 12031203[14]Duan X, Jia K, Li B, et al. Reversible image steganography scheme based on a UNet structure[J]. IEEE Access, 2019, 7: 93149323[15]Liu L, Meng L, Peng Y, et al. A data hiding scheme based on UNet and wavelet transform[J]. KnowledgeBased Systems, 2021, 223: 107022[16]Wang Z. Endtoend image steganography scheme based on UNet++ structure[C] Proc of the 4th Int Conf on Frontiers Technology of Information and Computer (ICFTIC). Piscataway, NJ: IEEE, 2022: 97101[17]Ronneberger O, Fischer P, Brox T. UNet: Convolutional networks for biomedical image segmentation[C] Proc of the 18th Int Conf on Medical Image Computing and ComputerAssisted Intervention(MICCAI 2015). Berlin: Springer, 2015: 234241[18]Hore A, Ziou D. Image quality metrics: PSNR vs SSIM[C] Proc of the 20th Int Conf on Pattern Recognition. Piscataway, NJ: IEEE, 2010: 23662369[19]Baluja S. Hiding images within images[J]. IEEE Trans on Pattern Analysis and Machine Intelligence, 2019, 42(7): 16851697[20]Zhu X, Lai Z, Zhou N, et al. Steganography with high reconstruction robustness: Hiding of encrypted secret images[J]. Mathematics, 2022, 10(16): 29342934[21]Pakdaman Z, NezamabadiPour H, Saryazdi S. A new reversible data hiding in transform domain[J]. Multimedia Tools Applications, 2021, 80: 89318955[22]Rosalina N H. An approach of securing data using combined cryptography and steganography[J]. International Journal of Mathematical Sciences and Computing, 2020, 6(1): 19 |