[14] |
KIPF T N , WELLING M . Variational graph auto-encoders[J]. arXiv preprint arXiv:1611.07308, 2016.
|
[15] |
YANG Z , DU X , TAN Y ,et al. Aag-stega:Automatic audio generation-based steganography[J]. arXiv preprint arXiv:1809.03463, 2018.
|
[16] |
SHI H C , DONG J , WANG W ,et al. SSGAN:secure steganography based on generative adversarial networks[M]// Advances in Multimedia Information Processing - PCM 2017. Cham: Springer, 2018: 534-544.
|
[17] |
SIMMONS G J . The prisoners’ problem and the subliminal channel[M]// Advances in Cryptology. Boston,MA: Springer, 1984: 51-67.
|
[18] |
VAN DEN OORD A , KALCHBRENNER N , VINYALS O ,et al. Conditional image generation with pixel CNN decoders[J]. CoRR,2016,abs/1606.05328:null.
|
[19] |
GERMAIN M , GREGOR K , MURRAY I ,et al. Made:masked autoencoder for distribution estimation[C]// International Conference on Machine Learnin. 2015: 881-889.
|
[20] |
URIA B , C?Té M A , GREGOR K ,et al. Neural autoregressive distribution estimation[J]. The Journal of Machine Learning Research, 2016,17(1): 7184-7220.
|
[21] |
OORD A , DIELEMAN S , ZEN H ,et al. Wavenet:A generative model for raw audio[J]. arXiv preprint arXiv:1609.03499, 2016.
|
[22] |
LI L , ZHANG W M , CHEN K J ,et al. Steganographic security analysis from side channel steganalysis and its complementary attacks[J]. IEEE Transactions on Multimedia, 2020,22(10): 2526-2536.
|
[23] |
国家密码管理局. SM4分组密码算法 GM/T 0002—2012[S]. 北京:中国标准出版社, 2012.
|
|
State Cryptography Administration. SM4 block cipher algorithm.GM/T 0002—2012[S]. Beijing:Standards Press of China, 2012.
|
[24] |
DAEMEN J , RIJMEN V . Reijndael:the advanced encryption standard[J]. Dr.Dobb's Journal:Software Tools for the Professional Programmer, 2001,26(3): 137-139.
|
[25] |
国家密码管理局. SM9 基于身份的公钥密码算法[S]. (2016:3).GM/T 0044. 2016.
|
|
State Cryptography Administration. SM9 Identity-based public key cryptography algorithm[S]. (2016:3).GM/T 0044. 2016.
|
[26] |
RIVEST R L , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126.
|
[27] |
KOMINEK J , BLACK A . The CMU Arctic speech databases[J]. Fifth ISCA Workshop on Speech Synthesis, 2004: 223-224.
|
[28] |
LUO W Q , LI H D , YAN Q ,et al. Improved audio steganalytic feature and its applications in audio forensics[J]. ACM Transactions on Multimedia Computing,Communications,and Applications, 2018,14(2): 1-14.
|
[29] |
CHEN K J , ZHOU H , LI W X ,et al. Derivative-based steganographic distortion and its non-additive extensions for audio[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(7): 2027-2032.
|
[1] |
BENDER W , GRUHL D , MORIMOTO N ,et al. Techniques for data hiding[J]. IBM Systems Journal, 1996,35: 313-336.
|
[2] |
MIELIKAINEN J . LSB matching revisited[J]. IEEE Signal Processing Letters, 2006,13(5): 285-287.
|
[3] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935.
|
[4] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[M]. Information Hiding. Berlin,Heidelberg: Springer, 2010: 161-177.
|
[5] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Proceedings of 2012 IEEE International Workshop on Information Forensics and Security (WIFS). 2012: 234-239.
|
[6] |
LI B , WANG M , HUANG J W ,et al. A new cost function for spatial image steganography[C]// Proceedings of 2014 IEEE International Conference on Image Processing (ICIP). 2014: 4206-4210.
|
[7] |
HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014,2014: 1-13.
|
[8] |
CACHIN C . An information-theoretic model for steganography[M]// Information Hiding. Berlin,Heidelberg: Springer, 1998: 306-318.
|
[9] |
HOPPER N , AHN L V , LANGFORD J . Provably secure steganography[C]// Proceedings of IEEE Transactions on Computers. 2009: 662-676.
|
[10] |
DEDI? N , ITKIS G , REYZIN L ,et al. Upper and lower bounds on black-box steganography[J]. Journal of Cryptology, 2009,22(3): 365-394.
|
[11] |
VON AHN L , HOPPER N J . Public-key steganography[M]// Advances in Cryptology-EUROCRYPT 2004. Berlin,Heidelberg: Springer, 2004: 323-341.
|
[12] |
VAN LE T . Efficient provably secure public key steganography[J]. IACR CryptolePrint Arch, 2003:156.
|
[13] |
GOODFELLOW I , POUGET-ABADIE J , MIRZA M ,et al. Generative adversarial nets[C]// Advances in Neural Information Processing Systems. 2014: 2672-2680.
|