[1] |
WANG Z C , FENG G R , REN Y L ,et al. Multichannel steganography in digital images for multiple receivers[J]. IEEE Multimedia, 2021,28(1): 65-73.
|
[2] |
WANG Z C , FENG G R , ZHANG X P . Repeatable data hiding:towards the reusability of digital images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022,32(1): 135-146.
|
[3] |
HU D H , WANG L , JIANG W J ,et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018,6: 38303-38314.
|
[4] |
XU M T , FENG G R,R , REN Y L ,et al. On cloud storage optimization of blockchain with a clustering-based genetic algorithm[J]. IEEE Internet of Things Journal, 2020,7(9): 8547-8558.
|
[5] |
Bigverse[EB].
|
[6] |
孙曦, 张卫明, 俞能海 ,等. 基于空域图像变换参数扰动的隐写术[J]. 通信学报, 2017,38(10): 166-174.
|
|
SUN X , ZHANG W M , YU N H ,et al. Steganography based on parameters' disturbance of spatial image transform[J]. Journal on Communications, 2017,38(10): 166-174.
|
[7] |
WANG Z C , FENG G R , QIAN Z X ,et al. JPEG steganography with content similarity evaluation[J]. IEEE Transactions on Cybernetics, 2022: 1-12.
|
[8] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935.
|
[9] |
LI W X , ZHANG W M , LI L ,et al. Designing near-optimal steganographic codes in practice based on polar codes[J]. IEEE Transactions on Communications, 2020,68(7): 3948-3962.
|
[10] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Proceedings of 2012 IEEE International Workshop on Information Forensics and Security. 2012: 234-239.
|
[11] |
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion[C]// Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security-IH&MMSec'13. 2013: 59-68.
|
[12] |
LI B , WANG M , HUANG J W ,et al. A new cost function for spatial image steganography[C]// Proceedings of 2014 IEEE International Conference on Image Processing. 2014: 4206-4210.
|
[13] |
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2): 221-234.
|
[14] |
YANG J H , RUAN D Y , HUANG J W ,et al. An embedding cost learning framework using GAN[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 839-851.
|
[15] |
RONNEBERGER O , FISCHER P , BROX T . U-Net:convolutional networks for biomedical image segmentation[C]// Proceedings of International Conference on Medical Image Computing and Computer- Assisted Intervention. 2015: 234-241.
|
[16] |
TANG W X , LI B , TAN S Q ,et al. CNN-based adversarial embedding for image steganography[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8): 2074-2087.
|
[17] |
DENEMARK T , FRIDRICH J . Steganography with multiple JPEG images of the same scene[J]. IEEE Transactions on Information Forensics and Security, 2017,12(10): 2308-2319.
|
[18] |
CHEN K J , ZHANG W M , ZHOU H ,et al. Defining cost functions for adaptive steganography at the microscale[C]// Proceedings of 2016 IEEE International Workshop on Information Forensics and Security. 2016: 1-6.
|
[19] |
ZHANG W M , ZHANG Z , ZHANG L L ,et al. Decomposing joint distortion for adaptive steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(10): 2274-2280.
|
[20] |
ZHOU W B , ZHANG W M , YU N H . A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2654-2667.
|
[21] |
WANG Z C , QIAN Z X , ZHANG X P ,et al. On improving distortion functions for JPEG steganography[J]. IEEE Access, 2018,6: 74917-74930.
|
[22] |
LI W X , CHEN K J , ZHANG W M ,et al. JPEG steganography with estimated side-information[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(7): 2288-2294.
|
[23] |
SHI L N , WANG Z C , QIAN Z X ,et al. Distortion function for steganography in texture synthesized images[M]// Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing. Cham: Springer International Publishing, 2018: 313-320.
|
[24] |
LI S , CHEN X , WANG Z C ,et al. Data hiding in IRIS image for privacy protection[J]. IETE Technical Review, 2018,35: 34-41.
|
[25] |
SHI L N , WANG Z C , QIAN Z X ,et al. Distortion function for emoji image steganography[J]. Computers,Materials & Continua, 2019,59(3): 943-953.
|
[26] |
WANG Z , FENG G , ZHANG X . Steganographic distortion function for enhanced images[C]// Proceedings of the 19th International Workshop on Digital-forensics and Watermarking (IWDW 2020). 2020: 31-40.
|
[27] |
PEVNY T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 215-224.
|
[28] |
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 868-882.
|
[29] |
HOLUB V , FRIDRICH J . Random projections of residuals for digital image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 1996-2006.
|
[30] |
DENEMARK T , SEDIGHI V , HOLUB V ,et al. Selection-channel-aware rich model for Steganalysis of digital images[C]// Proceedings of 2014 IEEE International Workshop on Information Forensics and Security. 2014: 48-53.
|
[31] |
GOLJAN M , FRIDRICH J , COGRANNE R . Rich model for Steganalysis of color images[C]// Proceedings of 2014 IEEE International Workshop on Information Forensics and Security. 2014: 185-190.
|
[32] |
LI B , LI Z P , ZHOU S J ,et al. New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator[J]. IEEE Transactions on Information Forensics and Security, 2018,13(5): 1242-1257.
|
[33] |
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 432-444.
|
[34] |
YE J , NI J Q , YI Y . Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2545-2557.
|
[35] |
LI B , WEI W H , FERREIRA A ,et al. ReST-net:diverse activation modules and parallel subnets-based CNN for spatial image steganalysis[J]. IEEE Signal Processing Letters, 2018,25(5): 650-654.
|
[36] |
BOROUMAND M , CHEN M , FRIDRICH J . Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1181-1193.
|
[37] |
YOU W K , ZHANG H , ZHAO X F . A Siamese CNN for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 291-306.
|
[38] |
YANG H W , HE H , ZHANG W Z ,et al. FedSteg:a federated transfer learning framework for secure image steganalysis[J]. IEEE Transactions on Network Science and Engineering, 2021,8(2): 1084-1094.
|
[39] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// Proceedings of the 12th International Conference on Information Hiding. 2010: 161-177.
|