1 |
J. Fridrich and J. Kodovsky, "Rich Models for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 868-882, June 2012.
DOI
|
2 |
A. Krizhevsky, I. Sutskever, and G.E. Hinton, "ImageNet Classification with Deep Convolutional Neural Networks," Communications of the ACM, Vol. 60, No. 6, pp. 84-90, 2017.
DOI
|
3 |
K. He, X. Zhang, S. Ren, and J. Sun, "Deep Residual Learning for Image Recognition," Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 770- 778, 2016.
|
4 |
M. Boroumand, M. Chen, and J. Fridrich, "Deep Residual Network for Steganalysis of Digital Images," IEEE Transactions on Information Forensics and Security, Vol. 14, No. 5, pp. 1181-1193, 2019.
DOI
|
5 |
G. Huang, Z. Liu, L. Maaten, and K.Q. Weinberger, "Densely Connected Convolutional Networks," Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700-4708, 2017.
|
6 |
R.J. Wang, X. Li, and C.X. Ling, "Pelee: A Real-Time Object Detection System on Mobile Devices," Proceeding of the 32nd International Conference on Neural Information Processing Systems, pp. 1967-1976, 2018.
|
7 |
K. Jung and K. Yoo, "Steganographic Method Based on Interpolation and LSB Substitution of Digital Images," Multimedia Tools and Applications, Vol 74, pp. 2143-2155, 2015.
DOI
|
8 |
D. Neeta, K. Snehal, and D. Jacobs, "Implementation of LSB Steganography and Its Evaluation for Various Bits," Proceeding of 1st International Conference on Digital Information Management, pp. 173-178, 2007.
|
9 |
V. Holub and J. Fridrich, "Designing Steganographic Distortion Using Directional Filters," Proceeding of IEEE Workshop on Information Forensic and Security, pp. 234-239, 2012.
|
10 |
V. Holub, J. Fridrich, and T. Denemark, "Universal Distortion Function for Steganography in an Arbitrary Domain," EURASIP Journal on Information Security, Article Number 1, 2014.
|
11 |
G. Xu, H. Wu, and Y. Shi, "Structural Design of Convolutional Neural Networks for Steganalysis," IEEE Signal Processing Letters, Vol. 23, No. 5, pp. 708-712, 2016.
DOI
|
12 |
V. Sedighi, R. Cogranne, and J. Fridrich, "Content-Adaptive Steganography by Minimizing Statistical Detectability," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 2, pp. 221-234, 2016.
DOI
|
13 |
S. Kang, H. Park, and J.-I. Park, "CNN-Based Ternary Classification for Image Steganalysis," Electronics, Vol. 8, No. 11, 1225, 2019.
DOI
|
14 |
S. Kang, H. Park, and J.-I. Park, "Classification of Multiple Steganographic Algorithms Using Hierarchical CNNs and ResNets," Proceeding of International Conference on Smart Computing and Cyber Security, pp. 365-373, 2020.
|
15 |
S. Kang, H. Park, J.-I. Park, and S. Kim, "Identification of Steganographic Methods Using a Hierarchical CNN Structure," Journal of Korea Institute of Convergence Signal Processing, Vol. 20, No. 4, pp. 205-211, 2019.
DOI
|
16 |
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB Steganography in Color, and Gray-Scale Images," IEEE MultiMedia, Vol. 8, No. 4, pp. 22-28, 2001.
DOI
|
17 |
Y.-R. Park and S.-U. Shin, "Applications of Image Steganography Using Secret Quantization Ranges," Journal of Korea Multimedia Society, Vol. 8, No. 3, pp. 379-388, 2005.
|