Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance |
Liu, Qiang
(College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Xiang, Xuyu (College of Computer Science and Information Technology, Central South University of Forestry & Technology) Qin, Jiaohua (College of Computer Science and Information Technology, Central South University of Forestry & Technology) Tan, Yun (College of Computer Science and Information Technology, Central South University of Forestry & Technology) Zhang, Qin (College of Computer Science and Information Technology, Central South University of Forestry & Technology) |
1 | H. Jegou, H. Hedi, and S. Cordelia, "A contextual dissimilarity measure for accurate and efficient image search," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-7, 2007. |
2 | Z. Zhou, Y. Mu, and Q. Wu, "Coverless image steganography using partial-duplicate image retrieval," Soft Computing, vol. 23, pp. 4972-4938, 2018. |
3 | Z. Zhou, J. Qin, X. Xiang, Y. Tan, Q. Liu, and N. N. Xiong, "News text topic clustering optimized method based on TF-IDF algorithm on spark," Computer Materials & Continua, vol. 62, no. 1, pp. 217-231, 2020. DOI |
4 | X. Zhang, F. Peng, and M. Long, "Robust coverless image steganography based on DCT and LDA topic classification," IEEE Transactions on Multimedia, vol. 99, no. 12, pp. 3223-3238, 2018. |
5 | T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," Lecture Notes in Computer Science, vol. 6837, pp.161-177, 2010. |
6 | J. Qin, X. Sun, X. Xiang, and C. Niu, "Principal feature selection and fusion method for Image steganalysis," Journal of Electronic Imaging, vol. 18, no. 3, pp. 1-14, 2009. |
7 | Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security, pp. 123-132, 2015. |
8 | N. Pan, J. Qin, Y. Tan, X. Xiang, and G. Hou, "A video coverless information hiding algorithm based on semantic segmentation," EURASIP Journal on Image and Video Processing, vol. 23, 2020. |
9 | C. Yuan, Z. Xia, and X. Sun, "Coverless image steganography based on SIFT and BOF," Journal of International and Technology, vol. 18, no. 2, pp. 435-442, 2017. |
10 | Q. Liu, X. Xiang, J. Qin, Y. Tan, J. Tan, and Y. Luo, "Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping," Knowledge-Based Systems, vol. 192, pp. 105375-105389, 2020. DOI |
11 | Y. Luo, J. Qin, X. Xiang, Y. Tan, Q. Liu, and L Xiang, "Coverless real-time image information hiding based on image block matching and dense convolutional network," Journal of Real-Time Image Processing, vol. 17, no. 1, pp. 125-135, 2020. DOI |
12 | Y. Luo, J. Qin, X. Xiang, and Y. Tan, "Coverless image steganography based on multi-object recognition," IEEE Transactions on Circuits and Systems for Video Technology, 2020. |
13 | C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper with convolutions," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-9, 2015. |
14 | J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, "Coverless image steganography: A survey," IEEE Access, vol. 7, pp. 171372-171394, 2019. DOI |
15 | A. Krizhevsky, I. Sutskever, and G. Hinton, "ImageNet classification with deep convolutional neural networks," in Proc. of International Conference on Neural Information Processing Systems, vol. 60, no. 6, pp. 1097-1105, 2012. |
16 | K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," Computer Science, 2014. |
17 | K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016. |
18 | W. Ma, J. Qin, X. Xiang, Y. Tan, Y. Luo, and N. N. Xiong, "Adaptive median filtering algorithm based on divide and conquer and its application in captcha recognition," Computer Materials & Continua, vol. 58, no. 3, pp. 665-677, 2019. DOI |
19 | L. Pan, J. Qin, H. Chen, X. Xiang, C. Li, and R. Chen, "Image augmentation-based food recognition with convolutional neural networks," Computer Materials & Continua, vol. 59, no. 1, pp. 297-313, 2019. DOI |
20 | L. Xiang, G. Guo, J. Yu, V. S. Sheng, and P. Yang, "A convolutional neural network-based linguistic steganalysis for synonym substitution steganography," Mathematical Biosciences and Engineering, vol. 17, no. 2, pp. 1041-1058, 2020. DOI |
21 | J. Wang, J. Qin, X. Xiang, Y. Tan, N. Pan, "Captcha recognition based on deep convolutional neural network," Mathematical Biosciences and Engineering, vol. 16, no, 5, pp. 5851-5861, 2019. DOI |
22 | H. Jegou, M. Douze, and C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in Proc. of European Conference on Computer Vision, pp. 304-317, 2008. |
23 | H. Li, J. Qin, X. Xiang, L. Pan, W. Ma, and N. N. Xiong, "An efficient image matching algorithm based on adaptive threshold and ransac," IEEE Access, vol. 6, pp. 66963-66971, 2018. DOI |
24 | J. Qin, H. Li, X. Xiang, Y. Tan, W. Pan, W. Ma, and N. N. Xiong, "An encrypted image retrieval method based on harris corner optimization and lsh in cloud computing," IEEE Access, vol. 7, pp. 24626-24633, 2019. DOI |
25 | L. Xiang, X. Shen, J. Qin, and W. Hao, "Discrete multi-graph hashing for large-scale visual search," Neural Processing Letters, vol. 49, no. 3, pp.1055-1069, 2019. DOI |
26 | Y. Tan, J. Qin, X. Xiang, W. Ma, W. Pan and N. N. Xiong, "A robust watermarking scheme in YCbCr color space based on channel coding," IEEE Access, vol. 7, pp. 25026-25036, 2019. DOI |
27 | S. Zheng, L. Wang, B. Ling, and D. Hu, "Coverless information hiding based on robust image hashing," in Proc. of International Conference on Intelligent Computing, pp. 536-547, 2017. |
28 | F. Li, R. Fergus, and P. Perona, "Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories," in Proc. of 2004 Conference on Computer Vision and Pattern Recognition Workshop, 2004. |
29 | G. Griffin, A. Holub, and P. Perona, "Caltech-256 object category dataset," CalTech Report, 2007. |
30 | W. Pan, J. Qin, X. Xiang, Y. Wu, Y. Tan, and L. Xiang, "A smart mobile diagnosis system for citrus diseases based on densely connected convolutional networks," IEEE Access, vol. 7, pp. 87534-87542, 2019. DOI |
31 | C. Yang, C. Weng, S. Wang, and H. Sun, "Adaptive data hiding in edge areas of images with spatial lsb domain systems," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488-497, 2008. DOI |
32 | W. Luo, F, Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, 2010. DOI |
33 | X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005. DOI |
34 | V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 234-239, 2012. |
35 | D. G. Lowe, "Object recognition from local scale-invariant features," in Proc. of the 7th IEEE International Conference on Computer Vision, vol. 2, pp. 1150-1157, 1999. |
36 | G. Huang, Z. Liu, L. Maaten, and K. Weinberger, "Densely connected convolutional networks," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2261-2269, 2017. |