[1] |
XIONG Jinbo, MA Rong, ZHANG Yuanyuan, et al. Image Information Hiding Method and Implementation for Social Network[J]. Netinfo Security, 2017, 17(3):6-8.
|
|
熊金波, 马蓉, 张媛媛, 等. 面向社交网络的图片信息隐藏方法与实现[J]. 信息网络安全, 2017, 17(3):6-8.
|
[2] |
LI Dan, GAO Yong. Audio Information Hiding Algorithm Based on Time-frequency Modulation Method Applied in Broadcast Channel[J]. Journal of Sichuan University (Natural Science Edition), 2017, 54(2):298-302.
|
|
李丹, 高勇. 适用于广播信道的时频调制音频隐藏算法[J]. 四川大学学报(自然科学版), 2017, 54(2):298-302.
|
[3] |
HOLUB V, FRIDRICH J, DENEMARK T. Universal Distortion Function for Steganography in an Arbitrary Domain[J]. EURASIP Journal on Information Security, 2014(1):1-13.
|
[4] |
DENEMARK T, FRIDRICH J, COMESAÑA-ALFARO P. Improving Selection-channel-aware Steganalysis Features[J]. Electronic Imaging, 2016(8):1-8.
|
[5] |
XU Guanshuo, WU Hanzhou, SHI Yunqing. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5):708-712.
doi: 10.1109/LSP.2016.2548421
URL
|
[6] |
YE Jian, NI Jiangqun, YI Yang. Deep Learning Hierarchical Representations for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2545-2557.
doi: 10.1109/TIFS.2017.2710946
URL
|
[7] |
BOROUMAND M, CHEN M, FRIDRICH J. Deep Residual Network for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1181-1193.
doi: 10.1109/TIFS.2018.2871749
URL
|
[8] |
SZEGEDY C, ZAREMBA W, SUTSKEVER I, et al. Intriguing Properties of Neural Networks[EB/OL]. https://arxiv.org/abs/1312.6199, 2014-02-19.
|
[9] |
GOODFELLOW I J, SHLENS J, SZEGEDY C. Explaining and Harnessing Adversarial Examples[EB/OL]. https://arxiv.org/abs/1412.6572, 2015-03-20.
|
[10] |
ZHANG Yiwei, ZHANG Weiming, CHEN Kejiang, et al. Adversarial Examples against Deep Neural Network Based Steganalysis[C]//ACM. Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, June 20-22, 2018, Innsbruck, Austria. New York: Association for Computing Machinery, 2018: 67-72.
|
[11] |
MOOSAVI-DEZFOOLI S M, FAWZI A, FROSSARD P. Deepfool: A Simple and Accurate Method to Fool Deep Neural Networks[C]//IEEE. Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 27-30, 2016, Las Vegas, NV, USA. New York: IEEE, 2016: 2574-2582.
|
[12] |
HOLUB V, FRIDRICH J. Designing Steganographic Distortion Using Directional Filters[C]//IEEE. 2012 IEEE International Workshop on Information Forensics and Security (WIFS), December 2-5, 2012, Costa Adeje, Spain. New York: IEEE, 2012: 234-239.
|
[13] |
PEVNÝ T, FILLER T, BAS P. Using High-dimensional Image Models to Perform Highly Undetectable Steganography[C]//Information Hiding. International Workshop on Information Hiding, Jun 28-30, 2010, Calgary, Canada. Heidelberg: Springer, 2010: 161-177.
|
[14] |
LI Bin, WANG Ming, HUANG Jiwu, et al. A New Cost Function for Spatial Image Steganography[C]//IEEE. 2014 IEEE International Conference on Image Processing(ICIP), October 27-30, 2014, Paris, France. New York: IEEE, 2014: 4206-4210.
|
[15] |
KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble Classifiers for Steganalysis of Digital Media[J]. IEEE Transactions on Information Forensics and Security, 2011, 7(2):432-444.
doi: 10.1109/TIFS.2011.2175919
URL
|
[16] |
ZHANG Ru, ZHU Feng, LIU Jianyi, et al. Depth-wise Separable Convolutions and Multi-level Pooling for An Efficient Spatial CNN-based Steganalysis[EB/OL]. https://ieeexplore.ieee.org/abstract/document/8809687, 2019-08-22.
|
[17] |
WANG Yaojie, NIU Ke, YANG Xiaoyuan. Image Steganography Scheme Based on GANs[J]. Netinfo Security, 2019, 19(5):54-60.
|
|
王耀杰, 钮可, 杨晓元. 基于生成对抗网络的图像隐藏方案[J]. 信息网络安全, 2019, 19(5):54-60.
|
[18] |
MOOSAVI-DEZFOOLI S M, FAWZI A, FAWZI O, et al. Universal Adversarial Perturbations[C]//IEEE. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition(CVPR), July 21-26, 2017, Honolulu, HI, USA. New York: IEEE, 2014: 4206-4210.
|
[19] |
SU J, VARGAS D V, SAKURAI K. One Pixel Attack for Fooling Deep Neural Networks[J]. IEEE Transactions on Evolutionary Computation, 2019, 23(5):828-841.
doi: 10.1109/TEVC.4235
URL
|
[20] |
ZHOU Lingchen, FENG Guorui, SHEN Liquan, et al. On Security Enhancement of Steganography via Generative Adversarial Image[J]. IEEE Signal Processing Letters, 2019, 27(99):166-170.
doi: 10.1109/LSP.97
URL
|
[21] |
GOODFELLOW I, POUGET-ABADIE J, MIRZA M, et al. Generative Adversarial Nets[C]// International Conference on Neural Information Processing Systems. Proceedings of the 27th International Conference on Neural Information Processing Systems, December 8-13, 2014, Montreal, Canada. Cambridge: MIT Press, 2014: 2672-2680.
|