1 |
A. Laszka and D. Szeszle, "Hide and seek in digital communication: the steganography game," in Proc. of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications, Fukuoka Japan, June 2-5, 2015
|
2 |
Y.Qian, J. Dong, W. Wang, "Deep learning for steganalysis via convolutional neural networks," in Proc. of Media Watermarking, Security, and Forensics International Society for Optics and Photonics, vol. 9409, pp. 94090J, 2015.
|
3 |
X. Xu, Y.Sun, G. Tang, S. Chen, & J. Zhao, "Deep learning on spatial rich model for steganalysis," in Proc. of International Workshop on Digital Watermarking. Springer, pp. 564-577, 2016.
|
4 |
J. Zeng, S. Tan, B. Li, and J. Huang, "Large-scale JPEG image steganalysis using hybrid deep-learning framework," IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214, 2018.
DOI
|
5 |
M. Boroumand, M. Chen, and J. Fridrich, "Deep residual network for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181-1193, 2019.
DOI
|
6 |
J. Fridrich and D. Soukal, "Matrix embedding for large payloads," SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
|
7 |
R. Zhang, F. Zhu, J. Liu, and G. Liu, "Efficient feature learning and multi-size image steganalysis based on CNN," Multimedia, Jul 2018.
|
8 |
J. Zeng, S. Tan, B. Li, and J. Huang, "Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis," Electronic Imaging, vol. 2017, no. 7, pp. 44-49, 2017.
|
9 |
M. Zheng, S.-h. Zhong, S. Wu, and J. Jiang, "Steganographer detection via deep residual network," in Proc. of 2017 IEEE International Conference on Multimedia and Expo (ICME). IEEE, pp. 235-240, 2017.
|
10 |
K. Zhong, G. Feng, "Deep learning for steganalysis based on filter diversity selection," Science China Information Sciences, vol. 61, p. 129105, 2018.
DOI
|
11 |
C. F. Tsang and J. Fridrich, "Steganalyzing images of arbitrary size with CNNs," Electronic Imaging, vol. 2018, no. 7, pp. 121-1-121-8(8), pp. 1-8, 2018.
|
12 |
X. Zhang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, pp. 781-783, 2006.
DOI
|
13 |
D. Volkhonskiy, B. Borisenko, and E. Burnaev, "Generative adversarial networks for image steganography," ICLR, 2017.
|
14 |
X. Duan, K. Jia, B. Li, D. Guo, E. Zhang, "Reversible image steganography scheme based on a u-net structure," IEEE Access, vol. 7, pp. 9314-9323, 2019.
DOI
|
15 |
K. A. Zhang, A. Cuesta-Infante, and K.Veeramachaneni, "Steganogan: Pushing the limits of image steganography," January 2019.
|
16 |
A. Saleema, "A new steganography algorithm using hybrid fuzzy neural networks," Procedia Technology, vol. 24, pp. 1566-1574, 2016.
DOI
|
17 |
D. Volkhonskiy, I. Nazarov, B. Borisenko, and E. Burnaev, "Steganographic generative adversarial networks,"Multimedia, 2017.
|
18 |
N. Papernot, P. McDaniel, I. Goodfellow, "Practical black-box attacks against machine learning," in Proc. of Asia conference on computer and communications security. ACM, pp. 506-519, 2017.
|
19 |
V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," in Proc. of 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp. 234-239. 2012.
|
20 |
B. Li, M. Wang, J. Huang, and X. Li, "A new cost function for spatial image steganography," in Proc. of IEEE International Conference on Image Processing (ICIP), pp. 4206-4210, 2014.
|
21 |
Z. Wang, X. Zhang, and Z. Yin, "Hybrid distortion function for JPEG steganography," Journal of Electronic Imaging, vol. 25, no. 5, p. 050501, 2016.
DOI
|
22 |
T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. of International Workshop on Information Hiding. Springer, pp. 161-177, 2010.
|
23 |
V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of the first ACM workshop on Information hiding and multimedia security. ACM, pp. 59-68, 2013.
|
24 |
L. Guo, J. Ni, and Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE transactions on Information Forensics and Security, vol. 9, no. 5, pp. 814-825, 2014.
DOI
|
25 |
V. Holub, "Universal distortion function for steganography in an arbitrary domain," Eurasip Journal on Information Security, vol. 2014, p. 1, 2014.
DOI
|
26 |
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, "Intriguing properties of neural networks," 2013.
|
27 |
I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," ICLR, 2015.
|
28 |
Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu, and N. Yu, "Adversarial examples against deep neural network based steganalysis," in Proc. of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 67-72, 2018.
|
29 |
S. Baluja and I. Fischer, "Adversarial transformation networks: Learning to generate adversarial examples," arXiv preprint arXiv:1703.09387,2017.
|
30 |
J. Kos, I. Fischer, and D. Song, "Adversarial examples for generative models," in Proc. of 2018 IEEE Security and Privacy Workshops. IEEE, pp. 36-42, 2018.
|
31 |
W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, "CNN based adversarial embedding with minimum alteration for image steganography, IEEE Trans. Inf. Forensics Secur," 2018.
|
32 |
J. Zhu, R. Kaplan, "Hidden: Hiding data with deep networks," in Proc. of the European Conference on Computer Vision, pp. 682-697, 2018.
|
33 |
J. Hayes, "Generating steganographic images via adversarial training," Advances in Neural Information Processing Systems, pp.1954-1963, 2017.
|
34 |
S. Ma, Q. Guan, X. Zhao, and Y. Liu, "Adaptive spatial steganography based on probability-controlled adversarial examples," 2018.
|
35 |
W. Tang, S. Tan, B. Li, and J. Huang, "Automatic steganographic distortion learning using a generative adversarial network," IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547-1551, 2017.
DOI
|
36 |
S. Tan and B. Li, "Stacked convolutional auto-encoders for steganalysis of digital images," in Proc. of Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific. IEEE, pp. 1-4, 2014.
|
37 |
G. Xu, "Deep convolutional neural network to detect J-UNIWARD," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp. 67-73, 2017.
|
38 |
G. Xu, H.-Z. Wu, and Y. Q. Shi, "Ensemble of CNNs for steganalysis: An empirical study," in Proc. of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp.103- 107, 2016.
|
39 |
W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, "CNN-based adversarial embedding for image steganography," IEEE Transactions on Information Forensics and Security, 2019.
|
40 |
M. Abadi and D. G. Andersen, "Learning to protect communications with adversarial neural cryptography," in Proc. of ICLR, 2017.
|
41 |
J. Yang, K. Liu, X. Kang, E. K. Wong, and Y.Q. Shi, "Spatial image steganography based on generative adversarial network," 2018.
|
42 |
Meng, Ruohan, Steven G. Rice, "A fusion steganographic algorithm based on faster R-CNN," Computers, Materials & Continua, vol. 55, no. 1, 2018.
|
43 |
M. Yedroudj, F. Comby, and M. Chaumont, "Yedroudj-Net: An efficient CNN for spatial steganalysis," in Proc. of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 2092-2096, 2018.
|
44 |
J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012.
DOI
|
45 |
D. Hu, S. Zhou, Q. Shen, S. Zheng, "Digital image steganalysis based on visual attention and deep reinforcement learning," IEEE Access, 2019.
|
46 |
W. Huang, X.-F. Zhao, D.-G. Feng, and R.-N. Sheng, "Jpeg steganalysis based on feature fusion by principal component analysis," Ruanjian Xuebao/Journal of Software, vol. 23, no. 7, pp. 1869-1879, 2012.
|
47 |
Y. Ke, M. Zhang, J. Liu, and X. Yang, "Generative steganography with kerckhoffs' principle based on generative adversarial networks," Multimedia, 2017.
|
48 |
Z. Zhang, G. Fu, J. Liu, and W. Fu, "Generative information hiding method based on adversarial networks," in Proc. of International Conference on Computer Engineering and Networks. Springer, pp. 261-270, 2018.
|
49 |
Israr Hussain, Qianhua He, & Zhuliang Chen, "Automatic Fruit Recognition Based on DCNN for Commercial Source Trace System," International Journal on Computational Science & Applicatons (IJCSA), vol. 8, no. 2/3, pp. 1-14, 2018.
|
50 |
V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1996-2006, 2013.
DOI
|
51 |
J. Ye, J. Ni, and Y. Yi, "Deep learning hierarchical representations for image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545-2557, 2017.
DOI
|
52 |
Jung, Ki-Hyun, "A Study on Machine Learning for Steganalysis," in Proc. of the 3rd International Conference on Machine Learning and Soft Computing. ACM, pp. 12-15, 2019.
|
53 |
J. Yang, K. Liu, X. Kang, E. Wong, and Y. Shi, "Steganalysis based on awareness of selection-channel & deep learning," in Proc. of International Workshop on Digital Watermarking. Springer, pp. 263-272, 2017.
|
54 |
D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38 303-38 314, 2018.
DOI
|
55 |
P. Wu, Y. Yang, and X. Li, "StegNet: Mega image steganography capacity with deep convolutional network," Future Internet, vol. 10 , p. 54, 2018.
DOI
|
56 |
Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C. and Yu, P.S, "A comprehensive survey on graph neural networks," Journal of Latex Class Files, 2019.
|
57 |
J. Qin, X. Sun, X. Xiang, "Principal feature selection and fusion method for image steganalysis," Journal of Electronic Imaging, vol. 18(3), 033009, 2009.
DOI
|
58 |
T. Denemark, J. Fridrich, "Improving selection-channel-aware steganalysis features," Electronic Imaging, vol. 2016, no. 8, pp. 1-8, 2016.
DOI
|
59 |
T.Denemark,V.Sedighi, V.Holub, R.Cogranne, and J. Fridrich, "Selection-channel-aware rich model for steganalysis of digital images," in Proc. of 2014 IEEE International Workshop on Information Forensics and Security. IEEE, pp. 48-53, 2014.
|
60 |
Odena, A., Olah, C. and Shlens, "Conditional image synthesis with auxiliary classifier gans," in Proc. of ICML, Volume 70 , pp. 2642-2651, August 2017.
|
61 |
Liu, Wei, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, "SSD: Single shot multibox detector," in Proc. of European conference on computer vision, pp. 21-37, 2016.
|
62 |
V. Holub and J. Fridrich, "Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, Feb. 2015.
DOI
|
63 |
H. Shi, J. Dong, W. Wang, Y. Qian, and X. Zhang, "SSGAN: secure steganography based on generative adversarial networks," in Proc. of Pacific Rim Conference on Multimedia. Springer, pp. 534-544, 2017.
|
64 |
G. Xu, H.-Z. Wu, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, pp.708-712, 2016.
DOI
|
65 |
M. Chen, M. Boroumand, and J. Fridrich, "Deep learning regressors for quantitative steganalysis," Electronic Imaging, vol. 2018, pp. 160-1-160-7(7), 2018.
|
66 |
Ren, Shaoqing, Kaiming He, Ross Girshick, and Jian Sun. "Faster R-CNN: Towards real-time object detection with region proposal networks," Advances in neural information processing systems, pp. 91-99. 2015.
|
67 |
L. Pibre, J. Pasquet, D. Ienco, and M. Chaumont, "Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch," Electronic Imaging, vol. 2016, no. 8, pp.1-11, 2016.
|
68 |
M. Salomon, R. Couturier, C. Guyeux, "Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine," European Research in Telemedicine/La Recherche, vol. 6, no. 2, pp. 79-92, 2017.
DOI
|
69 |
S. Wu, S.-h. Zhong, and Y. Liu, "A novel convolutional neural network for image steganalysis with shared normalization," IEEE Transactions on Multimedia, vol. 22, no. 1, pp. 256-270, 2019.
DOI
|
70 |
S. Baluja, "Hiding images in plain sight: Deep steganography," Advances in Neural Information Processing Systems, pp. 2069- 2079, 2017.
|
71 |
J. Lu, G. Zhou, C. Yang, Z. Li, "Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection," IEEE Access, vol. 7, pp. 21 702-21711, 2019.
DOI
|
72 |
A. Kokaj, "Cyber war and terrorism in kosovo," Academic Journal of Business, Administration, Law and Social Sciences, 2019.
|
73 |
B. Li, J. He, J. Huang, and Y. Q. Shi, "A survey on image steganography and steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, 2011.
|
74 |
J. Fridrich, Steganography in digital media: principles, algorithms, and applications, Cambridge University Press, 2009.
|
75 |
B. Li, W. Wei, A. Ferreira, and S. Tan, "Rest-Net: Diverse activation modules and parallel subnets-based CNN for spatial image steganalysis," IEEE Signal Processing Letters, vol. 25, no. 5, pp. 650-654, 2018.
DOI
|
76 |
V. Sedighi and J. Fridrich, "Histogram layer, moving convolutional neural networks towards feature-based steganalysis," Electronic Imaging, vol. 2017, no. 7, pp. 50-55.
|
77 |
J. Zeng, S. Tan, G. Liu, B. Li, and J. Huang, "WISERNET: Wider separate-then-reunion network for steganalysis of color images," IEEE Transactions on Information Forensics and Security, 2019.
|
78 |
M. Chen, V. Sedighi, M. Boroumand, and J. Fridrich, "Jpeg-phase- aware convolutional neural network for steganalysis of jpeg images," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp. 75-84, 2017.
|
79 |
J. Yang, Y.-Q. Shi, E. K. Wong, and X. Kang, "JPEG steganalysis based on Dense-Net," Multimeida, ArXiv abs/1711.09335, 2017
|
80 |
S. Wu, S. Zhong, "Deep residual learning for image steganalysis," Multimedia tools & Applications, vol. 77, no. 9, pp.10 437-10 453, 2018.
DOI
|
81 |
J. Tian and Y. Li, "Convolutional neural networks for steganalysis via transfer learning," International Journal of Pattern Recognition and Artificial Intelligence, vol. 33, no. 02, p. 1959006, 2019.
DOI
|
82 |
Dai, Jifeng, Yi Li, Kaiming He, and Jian Sun, "R-FCN: Object detection via region-based fully convolutional networks," Advances in neural information processing systems, pp. 379-387, 2016.
|