[1] |
沈昌祥, 张焕国, 冯登国 ,等. 信息安全综述[J]. 中国科学(信息科学), 2007,37(1): 129-150.
|
|
SHEN C X , ZHANG H G , FENG D G ,et al. Survey on information security[J]. Science in China Series (Information Sciences), 2007,37(1): 129-150.
|
[2] |
王向阳, 杨红颖 . DCT域自适应彩色图像二维数字水印算法研究[J]. 计算机辅助设计与图形学学报, 2004,16(2): 243-247.
|
|
WANG X Y , YANG H Y . Adaptive 2-D color image watermarking based on DCT[J]. Journal of Computer-Aided Design and Computer Graphics, 2004,16(2): 243-247.
|
[3] |
王向阳, 杨红颖 . 基于视觉掩蔽特性的小波域彩色数字水印技术[J]. 计算机辅助设计与图形学学报, 2004,16(9): 1240-1243.
|
|
WANG X Y , YANG H Y . Color digital watermarking based on integer lifting wavelet transform and visual masking[J]. Journal of Computer-Aided Design and Computer Graphics, 2004,16(9): 1240-1243.
|
[4] |
PEVNY T , FILLER T , BAS P . Using high~dimensional image models to perform highly undetectable steganography[C]// International Workshop on Information Hiding. Springer, 2010: 161-177.
|
[5] |
HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014,1(1):1.
|
[6] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// IEEE International Workshop on Information Forensics & Security. IEEE, 2012: 234-239.
|
[7] |
SHI H C , DONG J , WANG W ,et al. SSGAN:secure steganography based on generative adversarial networks[C]// 18th Pacific-Rim Conference on Multimedia. Springer, 2017: 534-544.
|
[8] |
ARJOVSKY M , CHINTALA S , BOTTOU L . Wasserstein GAN[J]. arXiv Preprint,arXiv:1701.07875, 2017: 1-32.
|
[9] |
HAYES J , DANEZIS G . Ste-GAN-ography:generating steganographic images via adversarial training[J]. arXiv Preprint,arXiv:170300371v2, 2017: 1-9.
|
[10] |
REHMAN A U , RAHIM R , NADEEM S ,et al. End-to-end trained CNN encode-decoder networks for image steganography[J]. arXiv Preprint,arXiv:1711.07201, 2017: 1-5.
|
[11] |
BALUJA S , . Hiding images in plain sight:deep steganography[C]// Advances in Neural Information Processing Systems. 2017:
|
[12] |
CHU C , ZHMOGINOV A , SANDLER M . CycleGAN,a master of steganography[C]// Thirty-first Conference on Neural Information Processing Systems. 2017: 1-6.
|
[13] |
TANG W , TAN S , LI B ,et al. Automatic steganographic distortion learning using a generative adversarial network[J]. IEEE Signal Processing Letters, 2017,24(10): 1547-1551.
|
[14] |
ZHANG R , DONG S Q , LIU J Y . Invisible steganography via generative adversarial networks[J]. Multimedia Tools and Applications, 2019,78(7): 8559-8575.
|
[15] |
WU P , YANG Y , LI X . StegNet:MEGA image steganography capacity with deep convolutional network[J]. Future Internet, 2018,10(6): 54-68.
|
[16] |
DUAN X T , JIA K , LI B X ,et al. Reversible image steganography scheme based on a U-Net structure[J]. IEEE Access, 2019,7(1): 9314-9323.
|
[17] |
XU G , . Deep convolutional neural network to detect J-UNIWARD[C]// The 5th ACM Workshop on Information Hiding and Multimedia Security. 2017: 67-73.
|
[18] |
SZEGEDY C , VANHOUCKE V , IOFFE S ,et al. Rethinking the inception architecture for computer vision[C]// IEEE Conference on Computer Vision and Pattern Recognition. 2016: 2818-2826.
|
[19] |
IOFFE S , SZEGEDY C . Batch normalization:accelerating deep network training by reducing internal covariate shift[J]. arXiv Preprint,arXiv:1502,03167,2015.
|
[20] |
GOODFELLOW I , POUGET-ABADIE J , MIRZA M ,et al. Generative adversarial nets[C]// International Conference on Neural Information Processing Systems. 2014: 2672-2680.
|
[21] |
WANG Z , BOVIK A , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612.
|
[22] |
EVERINGHAM M . The PASCAL visual object classes challenge(VOC2007)Results[J]. Lecture Notes in Computer Science, 2007,111(1): 98-136.
|
[23] |
YE J , NI J , YI Y . Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2545-2557.
|