[1] 柯彦,张敏情,刘佳. 可分离的加密域十六进制可逆信息隐藏[J]. 计算机应用,2016,36(11):3082-3087.(KE Y,ZHANG M Q, LIU J. Separable reversible hexadecimal data hiding in encrypted domain[J]. Journal of Computer Applications,2016,36(11):3082-3087.) [2] 任魏翔,翟黎明,王丽娜,等. 基于卷积神经网络的JPEG图像隐写分析参照图像生成方法[J]. 计算机研究与发展,2019,56(10):2250-2261.(REN W X,ZHAI L M,WANG L N,et al. Reference image generation algorithm for JPEG image steganalysis based on convolutional neural network[J]. Journal of Computer Research and Development,2019,56(10):2250-2261.) [3] FRIDRICH J,KODOVSKY J. 1 Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security,2012,7(3):868-882. [4] QIAN Y,DONG J,WANG W,et al. Deep learning for steganalysis via convolutional neural networks[C]//Proceedings of the 2015 International Society for Optical Engineering. San Francisco:SPIE,2015:9409:94090J-1-94090J-10. [5] XU G,WU H-Z,SHI Y-Q. Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Processing Letters,2016,23(5):708-712. [6] YE J,NI J Q,YI Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security,2017,12(11):2545-2557. [7] BOROUMAND M,CHEN M,FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security,2018,14(5):1181-1193. [8] ZHANG R, ZHU F, LIU J, et al. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis[J]. IEEE Transactions on Information Forensics and Security,2019,15:1138-1150. [9] 张敏情,黄思远,柯彦, 等. 一种基于显著性检测的图像自适应隐写分析系统及方法:202010524234.1[P/OL]. 2020-06-10[2020-12-10]. http://cprs.patentstar.com.cn/Search/Detail?ANE=6BDA7FCA9CHC9FHD9DID9IDC7CAA9BIC8AEA6DBA7CCA9HAC.(ZHANG M Q,HUANG S Y,KE Y,et al. Image adaptive steganalysis system and method based on saliency detection:202010524234.1[P/OL]. 2020-06-10[2020-12-10]. http://cprs.patentstar.com.cn/Search/Detail?ANE=6BDA7FCA9CHC9FHD9DID9IDC7CAA9BIC8AEA6DBA7CCA9HAC.) [10] PEVNY T,FILLER T,BAS P. Using high-dimensional image models to perform highly undetectable steganography[C]//Proceedings of the 2010 International Workshop on Information Hiding,LNCS 6958. Berlin:Springer,2010:161-177. [11] HOLUB V,FRIDRICH J. Designing steganographic distortion using directional filters[C]//Proceedings of the 2013 IEEE International Workshop on Information Forensic and Security. Piscataway:IEEE,2013:234-239. [12] HOLUB V,FRIDRICH J,DENEMARK T. Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security,2014,1(1):1. [13] GUO L,NI J,SHI Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//2012 IEEE International Workshop on Information Forensics and Security. Piscataway:IEEE,2012:2-5. [14] BORJI A,ITTI L. State-of-the-art in visual attention modeling[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,2013,35(1):185-207. [15] ZUND F,PRITCH Y,SORKINE-HORNUNG A,et al. Contentaware compression using saliency-driven image retargeting[C]//Proceedings of the 2013 IEEE International Conference on Image Processing. Piscataway:IEEE,2013:1845-1849. [16] SHUI L L. Aptive image segmentation based on saliency detection[J]. International Journal on Smart Sensing and Intelligent Systems,2015,8(1):408-428. [17] ZHANG F,DU B,ZHANG L. Saliency-guided unsupervised feature learning for scene classification[J]. IEEE Transactions on Geoscience and Remote Sensing,2015,53(4):2175-2184. [18] ITTI L,KOCH C,NIEBUR E. A model of saliency-based visual attention for rapid scene analysis[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,1998,20(11):1254-1259. [19] CHENG M-M,MITRA N J,HUANG X,et al. Global contrast based salient region detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,2015,37(3):569-582. [20] ZHANG L,DAI J,LU H,et al. A bi-directional message passing model for salient object detection[C]//Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2018:1741-1750. [21] CHEN S,TAN X,WANG B,et al. Reverse attention for salient object detection[C]//Proceedings of the 2018 European Conference on Computer Vision,LNCS 11213. Cham:Springer, 2018:234-250. [22] LIU N,HAN J W,YANG M. Picanet:Learning pixel-wise contextual attention for saliency detection[C]//Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2018:3089-3098. [23] QIN X,ZHANG Z,HUANG C,et al. BASNET:Boundary-aware salient object detection[C]//Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2019:7479-7489. [24] LU J,ZHOU G,YANG C,et al. Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection[J]. IEEE Access,2019,7:21702-21711. [25] RONNEBERGER O, FISCHER P, BROX T. U-Net:convolutional networks for biomedical image segmentation[C]//Proceedings of the 2015 International Conference on Medical Image Computing and Computer-assisted Intervention, LNCS 9351. Cham:Springer,2015:234-241. [26] YAN Q,XU L,SHI J,et al. Hierarchical saliency detection[C]//Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE,2013:1155-1162. [27] BAS P, FILLER T, PEVNY T. "Break our steganographic system":The ins and outs of organizing BOSS[C]//Proceedings of the 2011 International Workshop on Information Hiding,LNCS 6958. Berlin:Springer,2011:59-70. [28] GUO L,NI J,SHI Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics and Security,2014,9(5):814-825. [29] LI B,WANG M,HUANG J,et al. A new cost function for spatial image steganography[C]//Proceedings of the 2014 IEEE International Conference on Image Processing. Piscataway:IEEE, 2014:4206-4210. [30] KINGMA D P,BA J. Adam:a method for stochastic optimization[EB/OL]. (2017-01-30)[2020-07-25]. http://arxiv.org/abs/1412.6980 [31] XU G. Deep convolutional neural network to detect J-UNIWARD[C]//Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2017:67-73. [32] CHEN M,SEDIGHI V,BOROUMAND M,et al. JPEG-phaseaware convolutional neural network for steganalysis of JPEG images[C]//Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM, 2017:67-73. [33] DENEMARK T,BOROUMAND M,FRIDRICH J. Steganalysis features for content adaptive JPEG steganography[J]. IEEE Transactions on Information Forensics and Security,2016,11(8):1736-1746. [34] FRIDRICH J, KODOVSKÝ J. Rich models for steganalysis ofdigital images[J]. IEEE Transactions on Information Forensics and Security,2012,7(3):868-882. [35] YANG Z,WANG K,MA S,et al. IStego100K:large-scale image steganalysis dataset[EB/OL]. (2019-11-13)[2020-07-20]. https://arxiv.org/pdf/1911.05542.pdf. |