[1] |
XIANG S J, LUO X R. Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601.
|
[2] |
MANDAL P C, MUKHERJEE I, PAUL G, et al. Digital Image Steganography:A Literature Survey[J]. Information Sciences, 2022, 609:1451-1488.
doi: 10.1016/j.ins.2022.07.120
|
[3] |
NISSAR A, MIR A H. Classification of Steganalysis Techniques:A Study[J]. Digital Signal Processing, 2010, 20(6):1758-1770.
doi: 10.1016/j.dsp.2010.02.003
|
[4] |
翟黎明, 嘉炬, 任魏翔, 等. 深度学习在图像隐写术与隐写分析领域中的研究进展[J]. 信息安全学报, 2018, 3(6):2-12.
|
|
ZHAI Liming, JIA Ju, REN Weixiang, et al. Recent Advances in Deep Learning for Image Steganography and Steganalysis[J]. Journal of Cyber Security, 2018, 3(6):2-12.
|
[5] |
FRIDRICH J, KODOVSKY J. Rich Models for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882.
doi: 10.1109/TIFS.2012.2190402
|
[6] |
HOLUB V, FRIDRICH J. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J]. IEEE Transactions on Information Forensics and Security, 2014, 10(2):219-228.
|
[7] |
HOLUB V, FRIDRICH J. Phase-Aware Projection Model for Steganalysis of JPEG Images[C]// Media Watermarking,Security,and Forensics 2015. San Francisco: SPIE, 2015:259-269.
|
[8] |
SONG X, LIU F, YANG C, et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]// Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2015:15-23.
|
[9] |
SU W, NI J, HU X, et al. Towards Improving the Security of Image Steganography via Minimizing the Spatial Embedding Impact[J]. Digital Signal Processing, 2022, 131:103758.
doi: 10.1016/j.dsp.2022.103758
|
[10] |
邱应强, 蔡灿辉, 曾焕强, 等. 可自纠错的联合式加密图像可逆数据隐藏算法[J]. 西安电子科技大学学报, 2021, 48(1):107-116.
|
|
QIU Yingqiang, CAI Canhui, ZENG Huanqiang, et al. Joint Reversible Data Hiding in Encrypted Images with the Self-Correcting Ability[J]. Journal of Xidian University, 2021, 48(1):107-116.
|
[11] |
陈君夫, 付章杰, 张卫明, 等. 基于深度学习的图像隐写分析综述[J]. 软件学报, 2021, 32(2):551-578.
|
|
CHEN Junfu, FU Zhangjie, ZHANG Weiming, et al. Review of Image Steganalysis Based on Deep Learning[J]. Journal of Software, 2021, 32(2):551-578.
|
[12] |
KHAN A, SOHAIL A, ZAHOORA U, et al. A Survey of the Recent Architectures of Deep Convolutional Neural Networks[J]. Artificial Intelligence Review, 2020, 53:5455-5516.
doi: 10.1007/s10462-020-09825-6
|
[13] |
王晓丹, 李京泰, 宋亚飞. DDAC:面向卷积神经网络图像隐写分析模型的特征提取方法[J]. 通信学报, 2022, 43(5):68-81.
doi: 10.11959/j.issn.1000-436x.2022089
|
|
WANG Xiaodan, LI Jingtai, SONG Yafei. DDAC:A Feature Extraction Method for Model of Image Steganalysis Based on Convolutional Neural Network[J]. Journal on Communications, 2022, 43(5):68-81.
doi: 10.11959/j.issn.1000-436x.2022089
|
[14] |
TAN S, LI B. Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images[C]// Signal and Information Processing Association Annual Summit and Conference (APSIPA).Piscataway:IEEE, 2014:1-4.
|
[15] |
QIAN Y, DONG J, WANG W, et al. Deep Learning for Steganalysis via Convolutional Neural Networks[C]// Media Watermarking,Security,and Forensics 2015. San Francisco: SPIE, 2015:171-180.
|
[16] |
XU G, WU H Z, SHI Y Q. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5):708-712.
doi: 10.1109/LSP.2016.2548421
|
[17] |
YE J, NI J, YI Y. Deep Learning Hierarchical Representations for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2545-2557.
doi: 10.1109/TIFS.2017.2710946
|
[18] |
ZHANG R, ZHU F, LIU J, et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2019, 15:1138-1150.
doi: 10.1109/TIFS.10206
|
[19] |
TSANG C F, FRIDRICH J. Steganalyzing Images of Arbitrary Size with CNNs[J]. Electronic Imaging, 2018, 2018(7):121-1-121-8.
|
[20] |
YOU W, ZHANG H, ZHAO X. A Siamese CNN for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:291-306.
doi: 10.1109/TIFS.10206
|
[21] |
ZENG J, TAN S, LI B, et al. Pre-Training via Fitting Deep Neural Network to Rich-Model Features Extraction Procedure and Its Effect on Deep Learning for Steganalysis[J]. Electronic Imaging, 2017, 2017(7):44-49.
|
[22] |
ZENG J, TAN S, LI B, et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(5):1200-1214.
doi: 10.1109/TIFS.2017.2779446
|
[23] |
XU G. Deep Convolutional Neural Network to Detect J-UNIWARD[C]// Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2017:67-73.
|
[24] |
BOROUMAND M, CHEN M, FRIDRICH J. Deep Residual Network for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1181-1193.
doi: 10.1109/TIFS.2018.2871749
|
[25] |
SU A, ZHAO X, HE X. Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network[C]// International Workshop on Digital Watermarking.Heidelberg:Springer, 2021:197-211.
|
[26] |
LIU Q, NI J, JIAN M. Effective JPEG Steganalysis Using Non-Linear Pre-Processing and Residual Channel-Spatial Attention[C]// 2022 IEEE International Conference on Multimedia and Expo (ICME).Piscataway:IEEE, 2022:1-6.
|
[27] |
ZHUO S, JIN Z, ZOU W, et al. RIDNet:Recursive Information Distillation Network for Color Image Denoising[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops.Piscataway:IEEE, 2019:3896-3903.
|
[28] |
EBRAHIMI M S, ABADI H K. Study of Residual Networks for Image Recognition[C]// Intelligent Computing:Proceedings of the 2021 Computing Conference.Heidelberg:Springer, 2021:754-763.
|
[29] |
SETIADI D R I M. PSNR vs SSIM:Imperceptibility Quality Assessment for Image Steganography[J]. Multimedia Tools and Applications, 2021, 80(6):8423-8444.
doi: 10.1007/s11042-020-10035-z
|
[30] |
LIU Z, LIN Y, CAO Y, et al. Swin Transformer:Hierarchical Vision Transformer Using Shifted Windows[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision.Piscataway:IEEE, 2021:10012-10022.
|
[31] |
BAS P, FILLER T, PEVNY T. “Break Our Steganographic System”:The Ins and Outs of Organizing BOSS[C]// International Workshop on Information Hiding.Heidelberg:Springer, 2011:59-70.
|
[32] |
BAS P, FURON T. BOWS-2 Contest(Break Our Watermarking System)(2021)[OB/OL].[2021-12-12]. http://bows2.eclille.fr/.
|
[33] |
HOLUB V, FRIDRICH J. Digital Image SteganographyUsing Universal Distortion[C]// Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013:59-68.
|
[34] |
GUO L, NI J, SHI Y Q. Uniform Embedding for Efficient JPEG Steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5):814-825.
doi: 10.1109/TIFS.2014.2312817
|
[35] |
ZHANG J, CHEN K, QIN C, et al. Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis[J]. IEEE Transactions on Multimedia, 2021, 24:4538-4550.
doi: 10.1109/TMM.2021.3119994
|
[36] |
ZHANG K, ZUO W, CHEN Y, et al. Beyond a Gaussian Denoiser:Residual Learning of Deep CNN for Image Denoising[J]. IEEE Transactions on Image Processing, 2017, 26(7):3142-3155.
doi: 10.1109/TIP.83
|
[37] |
ZAMIR S W, ARORA A, KHAN S, et al. Learning Enriched Features for Real Image Restoration and Enhancement[C]// European Conference on Computer Vision.Heidelberg:Springer, 2020:492-511.
|