1 |
PEVNÝ T, FILLER T, BAS P. Using high-dimensional image models to perform highly undetectable steganography[C]// Proceedings of the 2010 International Workshop on Information Hiding, LNCS 6387. Berlin: Springer, 2010: 161-177.
|
2 |
HOLUB V, FRIDRICH J. Designing steganographic distortion using directional filters[C]// Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE, 2012: 234-239. 10.1109/wifs.2012.6412655
|
3 |
LI B, TAN S Q, WANG M, et al. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8): 1264-1277. 10.1109/tifs.2014.2326954
|
4 |
HOLUB V, FRIDRICH J, DENEMARK T. Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014, 2014: No.1. 10.1186/1687-417x-2014-1
|
5 |
FRIDRICH J, KODOVSKÝ J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. 10.1109/tifs.2012.2190402
|
6 |
BALUJA S. Hiding images within images [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020, 42(7): 1685-1697. 10.1109/tpami.2019.2901877
|
7 |
BALUJA S. Hiding images in plain sight: deep steganography [C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. Red Hook, NY: Curran Associates Inc., 2017: 2066-2076.
|
8 |
REHMAN A UR, RAHIM R, NADEEM S, et al. End-to-end trained CNN encoder-decoder networks for image steganography[C]// Proceedings of the 2018 European Conference on Computer Vision, LNCS 11132. Cham: Springer, 2019: 723-729.
|
9 |
ZHANG R, DONG S Q, LIU J Y. Invisible steganography via generative adversarial networks[J]. Multimedia Tools and Applications, 2019, 78(7): 8559-8575. 10.1007/s11042-018-6951-z
|
10 |
GATYS L A, ECKER A S, BETHGE M. Image style transfer using convolutional neural networks [C]// Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2016: 2414-2423. 10.1109/cvpr.2016.265
|
11 |
SIMONYAN K, ZISSERMAN A. Very deep convolutional networks for large-scale image recognition[EB/OL]. (2015-04-10) [2022-04-14]..
|
12 |
HUANG X, BELONGIE S. Arbitrary style transfer in real-time with adaptive instance normalization [C]// Proceedings of the 2017 IEEE International Conference on Computer Vision. Piscataway: IEEE, 2017: 1510-1519. 10.1109/iccv.2017.167
|
13 |
LI X T, LIU S F, KAUTZ J, et al. Learning linear transformations for fast image and video style transfer [C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 3804-3812. 10.1109/cvpr.2019.00393
|
14 |
LI Y J, FANG C, YANG J M, et al. Universal style transfer via feature transforms[C]// Proceedings of the 31st International Conference on Neural Information Processing Systems. Red Hook, NY: Curran Associates Inc., 2017: 385-395.
|
15 |
AN J, HUANG S Y, SONG Y B, et al. ArtFlow: unbiased image style transfer via reversible neural flows[C]// Proceedings of the 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2021: 862-871. 10.1109/cvpr46437.2021.00092
|
16 |
WANG Z H, GAO N, WANG X, et al. STNet: a style transformation network for deep image steganography [C]// Proceedings of the 2019 International Conference on Neural Information Processing, LNCS 11954. Cham: Springer, 2019: 3-14.
|
17 |
BI X L, YANG X Y, WANG C, et al. High-capacity image steganography algorithm based on image style transfer[J]. Security and Communication Networks, 2021, 2021: No.4179340. 10.1155/2021/4179340
|
18 |
LIN W J, ZHU X K, YE W J, et al. An improved image steganography framework based on Y channel information for neural style transfer[J]. Security and Communication Networks, 2022, 2022: No.2641615. 10.1155/2022/2641615
|
19 |
WANG Z, SIMONCELLI E P, BOVIK A C. Multiscale structural similarity for image quality assessment[C]// Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers. Piscataway: IEEE, 2003,2: 1398-1402. 10.1109/acssc.2003.1292181
|
20 |
BOEHM B. StegExpose — a tool for detecting LSB steganography[EB/OL]. (2014-10-24) [2022-05-01]..
|
21 |
DUMITRESCU S, WU X L, WANG Z. Detection of LSB steganography via sample pair analysis [J]. IEEE Transactions on Signal Processing, 2003, 51(7): 1995-2007. 10.1109/tsp.2003.812753
|
22 |
FRIDRICH J, GOLJAN M, DU R. Reliable detection of LSB steganography in color and grayscale images [C]// Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges. New York: ACM, 2001: 27-30. 10.1145/1232454.1232466
|
23 |
WESTFELD A, PFITZMANN A. Attacks on steganographic systems [C]// Proceedings of the 1999 International Workshop on Information Hiding, LNCS 1768. Berlin: Springer, 2000: 61-76.
|
24 |
付章杰,李恩露,程旭,等. 基于深度学习的图像隐写研究进展[J]. 计算机研究与发展, 2021, 58(3):548-568. 10.7544/issn1000-1239.2021.20200360
|
|
FU Z J, LI E L, CHENG X, et al. Recent advances in image steganography based on deep learning [J]. Journal of Computer Research and Development, 2021, 58(3):548-568. 10.7544/issn1000-1239.2021.20200360
|