[1] |
HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014,(1): 1-13.
|
[2] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Proceedings of 2012 IEEE International Workshop on Information Forensics and Security (WIFS). 2012: 234-239.
|
[3] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// Proceedings of International Workshop on Information Hiding.Springer. 2010: 161-177.
|
[4] |
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 868-882.
|
[5] |
SONG X , LIU F , YANG C ,et al. Steganalysis of adaptive JPEG steganography using 2D Gabor filters[C]// Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. 2015: 15-23.
|
[6] |
FENG G , ZHANG X , REN Y ,et al. Diversity-based cascade filters for JPEG steganalysis[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019,30(2): 376-386.
|
[7] |
YE J , NI J , YI Y . Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11): 2545-2557.
|
[8] |
YEDROUDJ M , COMBY F , CHAUMONT M . Yedroudj-net:an efficient CNN for spatial steganalysis[C]// 2018 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). 2018: 2092-2096.
|
[9] |
BOROUMAND M , CHEN M , FRIDRICH J . Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5): 1181-1193.
|
[10] |
ZHANG R , ZHU F , LIU J ,et al. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2020,15: 1138-1150.
|
[11] |
YOU W , ZHANG H , ZHAO X . A siamese CNN for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 291-306.
|
[12] |
沈军, 廖鑫, 秦拯 ,等. 基于卷积神经网络的低嵌入率空域隐写分析[J]. 软件学报, 2021,32(9): 2901-2915.
|
|
SHEN J , LIAO X , QIN Z ,et al. Spatial steganalysis of low embedding rate based on convolutional neural network[J]. Journal of Software, 2021,32(9): 2901-2915.
|
[13] |
JIA J , ZHAI L , REN W ,et al. Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis[J]. Pattern Recognition, 2020,100: 107105.
|
[14] |
XUE Y , YANG L , WEN J ,et al. A subspace learning-based method for JPEG mismatched steganalysis[J]. Multimedia Tools and Applications, 2019,78(7): 8151-8166.
|
[15] |
YANG Y , KONG X , FENG C . Double-compressed JPEG images steganalysis with transferring feature[J]. Multimedia Tools and Applications, 2018,77(14): 17993-18005.
|
[16] |
FENG C , KONG X W , LI M ,et al. Contribution-based feature transfer for JPEG mismatched steganalysis[C]// Proceedings of 2017 IEEE International Conference on Image Processing (ICIP). 2017: 500-504.
|
[17] |
YANG Y , KONG X , WANG B ,et al. Steganalysis on Internet images via domain adaptive classifier[J]. Neurocomputing, 2019,351: 205-216.
|
[18] |
LONG M , WANG J , DING G ,et al. Adaptation regularization:a general framework for transfer learning[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,26(5): 1076-1089.
|
[19] |
ZHANG X , KONG X , WANG P ,et al. Cover-source mismatch in deep spatial steganalysis[C]// Proceedings of 18th Workshop on Digital Watermarking. 2019: 71-83.
|
[20] |
HU D , MA Z , FAN Y ,et al. Study on the interaction between the cover source mismatch and texture complexity in steganalysis[J]. Multimedia Tools and Applications, 2019,78(6): 7643-7666.
|
[21] |
张逸为, 张卫明, 俞能海 . 针对特定测试样本的隐写分析方法[J]. 软件学报, 2018,29(4): 987-1001.
|
|
ZHANG Y W , ZHANG W M , YU N H . Specific testing sample steganalysis[J]. Journal of Software, 2018,29(4): 987-1001.
|
[22] |
OZCAN S , MUSTACOGLU A F . Transfer learning effects on image steganalysis with pre-trained deep residual neural network model[C]// Proceedings of 2018 IEEE International Conference on Big Data (Big Data). 2018: 2280-2287.
|
[23] |
EL BEJI R , SAIDI M , HERMASSI H ,et al. An improved CNN steganalysis architecture based on “Catalyst Kernels” and transfer learning[C]// Proceedings of International Conference on Digital Economy. 2018: 119-128.
|
[24] |
PEVNY T , FRIDRICH J . Merging Markov and DCT features for multi-class JPEG steganalysis[C]// Proceedings of Security,Steganography,and Watermarking of Multimedia Contents IX. 2007:650503.
|
[25] |
HOLUB V , FRIDRICH J . Low-complexity features for JPEG steganalysis using undecimated DCT[J]. IEEE Transactions on Information Forensics and Security, 2015,10(2): 219-228.
|
[26] |
KODOVSKY J , FRIDRICH J , . Calibration revisited[C]// Proceedings of the 11th ACM Workshop on Multimedia and Security. 2009: 63-74.
|
[27] |
PAN S J , YANG Q . A survey on transfer learning[J]. IEEE Transactions on Knowledge and Data Engineering, 2009,22(10): 1345-1359.
|
[28] |
BORGWARDT K M , GRETTON A , RASCH M J ,et al. Integrating structured biological data by kernel maximum mean discrepancy[J]. Bioinformatics, 2006,22(14): 49-57.
|
[29] |
TZENG E , HOFFMAN J , ZHANG N ,et al. Deep domain confusion:Maximizing for domain invariance[J]. arXiv preprint arXiv:1412.3474, 2014.
|
[30] |
LONG M , CAO Y , WANG J ,et al. Learning transferable features with deep adaptation networks[C]// Proceedings of International Conference on Machine Learning. 2015: 97-105.
|
[31] |
LONG M , ZHU H , WANG J ,et al. Deep transfer learning with joint adaptation networks[C]// Proceedings of International Conference on Machine Learning. 2017: 2208-2217.
|
[32] |
ZHU Y , ZHUANG F , WANG J ,et al. Deep subdomain adaptation network for image classification[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020,32(4): 1713-1722.
|
[33] |
GANIN Y , USTINOVA E , AJAKAN H ,et al. Domain-adversarial training of neural networks[J]. The Journal of Machine Learning Research, 2016,17(1): 2096-2030.
|
[34] |
YU C , WANG J , CHEN Y ,et al. Transfer learning with dynamic adversarial adaptation network[C]// Proceedings of 2019 IEEE International Conference on Data Mining (ICDM). 2019: 778-786.
|
[35] |
BAS P , FILLER T , PEVNY T , . “Break our steganographic system”:the ins and outs of organizing BOSS[C]// Proceedings of International Workshop on Information Hiding. 2011: 59-70.
|
[36] |
SCHAEFER G , STICH M . UCID:an uncompressed color image database[C]// Proceedings of Storage and Retrieval Methods and Applications for Multimedia. 2004: 472-480.
|
[37] |
AGUSTSSON E , TIMOFTE R . Ntire 2017 challenge on single image super-resolution:Dataset and study[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 2017: 126-135.
|
[38] |
HUISKES M J , LEW M S . The MIR flickr retrieval evaluation[C]// Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval. 2008: 39-43.
|
[39] |
VAN DER MAATEN L , HINTON G . Visualizing data using t-SNE[J]. Journal of Machine Learning Research, 2008,9(11): 2579-2605.
|