Ensemble Deep Learning Features for Real-World Image Steganalysis |
Zhou, Ziling
(College of Computer Science and Software Engineering, Shenzhen University)
Tan, Shunquan (College of Computer Science and Software Engineering, Shenzhen University) Zeng, Jishen (College of Information Engineering, Shenzhen University) Chen, Han (College of Information Engineering, Shenzhen University) Hong, Shaobin (College of Information Engineering, Shenzhen University) |
1 | J.S. Zeng, S.Q. Tan, B. Li and J.W. Huang, "Largescale JPEG image steganalysis using hybrid deep-learning framework," IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214, May 2018. DOI |
2 | M. Chen, V. Sedighi, M. Boroumand and J. Fridrich, "JPEG-phase-aware convolutional neural network for steganalysis of JPEG images," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, Pennsylvania, USA, pp.75-84, June 2017. |
3 | G.S. Xu, "Deep convolutional neural network to detect J-UNIWARD," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security, New York, United States, pp.67-73, June 2017. |
4 | X.S. Huang, S.L Wang, T.F. Sun, G.S. Liu and X. Lin, "Steganalysis of Adaptive JPEG Steganography Based on ResDet," in Proc. of the APSIPA Annual Summit and Conference, Honolulu, HI, USA, Nov. 12-15, 2018. |
5 | M. Boroumand, M. Chen and J. Fridrich," Deep residual network for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181-1193, Sept. 2018. DOI |
6 | V. Holub and J. Fridrich, "Low-complexity features for JPEG steganalysis using undecimated DCT," IEEE Transactions on Information Forensics and Security, vol.10, no. 2, pp. 219-228, Feb. 2015. DOI |
7 | V. Holub and J. Fridrich, "Phase-aware projection model for steganalysis of JPEG images," in Proc. of the Media Watermarking, Security, and Forensics, San Francisco, California, United States, Mar 8-12, 2015. |
8 | X. Song, F. Liu, C. Yang, X.Y. Luo and Y. Zhang, "Steganalysis of adaptive JPEG steganography using 2D Gabor filters," in Proc. of the 3rd ACM workshop on information hiding and multimedia security, Portland, Oregon, USA, pp.15-23, June 2015. |
9 | S. Ioffe, C. Szegedy, "Batch normalization: Accelerating deep network training by reducing internal covariate shift," arXiv preprint arXiv:1502.03167, 2015. |
10 | G. Huang, Z. Liu, L. V. D. Maaten and K. Q. Weinberger, "Densely Connected Convolutional Networks," in Proc. of the CVPR, Honolulu, HI, USA, pp.2261-2269, July 2017. |
11 | J. Yang, J.Y. Yang, D. Zhang and J.F. Lu, "Feature fusion: parallel strategy vs. serial strategy," Pattern recognition, Vol. 36, no. 6, pp. 1369-1381, June, 2003. DOI |
12 | Q. Gibouloto, R. Cogranneo, and P. Bas, "Steganalysis into the wild: How to define a source?," Electronic Imaging, no. 7, pp. 318-1-318-12, Jan. 2018. |
13 | I. Loshchilov and F. Hutter, "SGDR: Stochastic gradient descent with warm restarts," arXiv preprint arXiv:1608.03983, 2016. Article (Web Link) |
14 | V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, vol. 2014, no. 1, pp. 1-13, Jan. 2014. DOI |
15 | L. Guo, J.Q. Ni, W.K. Su, C.P. Tang, and Y.Q. Shi, "Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited," IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2669-2680, Aug. 2015. DOI |
16 | L. Guo, J.Q. Ni, and Y.Q. Shi, "Uniform Embedding for Efficient JPEG Steganography," IEEE Transactions on Information Forensics and Security, vol. 9, no. 5, pp. 814-825, Mar. 2014. DOI |
17 | F. Jessica, T. Pevny, and J. Kodovsky, "Statistically undetectable jpeg steganography: dead ends challenges, and opportunities," in Proc. of the 9th MM&Sec'07, New York, United States, pp.3-14, Sept. 2007. |
18 | C.F. Tsang and J. Fridrich, "Steganalyzing images of arbitrary size with CNNs," Electronic Imaging, no. 7, pp.121-1-121-8, Jan. 2018. |
19 | W.K.You, H. Zhang, and X.F. Zhao, "A Siamese CNN for Image Steganalysis," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291-306, July, 2020. DOI |
20 | B.C. Chen, J.X. Wang, Y.Y. Chen, Z.L. Jin, H.J. Shim and Y.Q. Shi, "High-Capacity Robust Image Steganography via Adversarial Network," KSII Transactions on Internet & Information Systems, vol. 14, no. 1, pp. 366-381, Jan. 2020. DOI |
![]() |