1 |
G. Xu and H. Wu, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708-712, 2016.
DOI
|
2 |
J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
DOI
|
3 |
C. Chan and L. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, 37(3), 469-474, 2004.
DOI
|
4 |
D. Wu and W. Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognition, 24, 1613, 2003.
DOI
|
5 |
V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," IEEE Workshop on Information Forensic and Security, 2012.
|
6 |
V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP Journal on Information Security, 2014.
|
7 |
S. Kang, H. Park, and J.-I. Park, "CNN-based ternary classification for image steganalysis," Electronics, vol. 8, no. 11, 1225, 2019.
DOI
|
8 |
P. Bas, T. Filler, and T. Pevny, "Break our steganographic system - the ins and outs of organizing BOSS," International Workshop on Information Hiding, pp. 59-70, 2011.
|