[1] |
FRIDRICH J, KODOVSKY J . Rich Models for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3):868-882.
doi: 10.1109/TIFS.2012.2190402
|
[2] |
QIAN Y L, DONG J, WANG W, et al. Deep Learning for Steganalysis via Convolutional Neural Networks [C]//Proceedings of the SPIE: 9409. Bellingham: SPIE, 2015: 94090J.
|
[3] |
XU G S, WU H Z, SHI Y Q . Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 2016,23(5):708-712.
doi: 10.1109/LSP.2016.2548421
|
[4] |
WU S T, ZHONG S H, LIU Y . Deep Residual Learning for Image Steganalysis[J]. Multimedia Tools and Applications, 2018,77(9):10437-10453.
doi: 10.1007/s11042-017-4440-4
|
[5] |
CAI B L, XU X M, JIA K , et al. Dehazenet: An End-to-end System for Single Image Haze Removal[J]. IEEE Transactions on Image Processing, 2016,25(11):5187-5198.
doi: 10.1109/TIP.2016.2598681
pmid: 28873058
|
[6] |
HE K M, ZHANG X Y, REN S Q, et al. Deep Residual Learning for Image Recognition [C]//Proceedings of the 2016 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Washington: IEEE Computer Society, 2016: 770-778.
|
[7] |
YE J, NI J, YI Y . Deep Learning Hierarchical Representations for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11):2545-2557.
doi: 10.1109/TIFS.2017.2710946
|
[8] |
KODOVSKY J, FRIDRICH J, HOLUB V . Ensemble Classifiers for Steganalysis of Digital Media[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):432-444.
doi: 10.1109/TIFS.2011.2175919
|
[9] |
XIE S N, GIRSHICK R, DOLLAR P, et al. Aggregated Residual Transformations for Deep Neural Networks [C]//Proceedings of the 2017 30th IEEE Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2017: 5987-5995.
|
[10] |
刘逸, 慕彩红, 刘敬 . 结合邻域信息粒子群聚类用于 SAR 图像变化检测[J]. 西安电子科技大学学报, 2015,42(1):187-193.
doi: 10.3969/j.issn.1001-2400.2015.01.030
|
|
LIU Yi, MU Caihong, LIU Jing . Change Detection for SAR Images Based on the Particle Swarm Clustering Algorithm Using Neighborhood in Formation[J]. Journal of Xidian University, 2015,42(1):187-193.
doi: 10.3969/j.issn.1001-2400.2015.01.030
|
[11] |
SEDIGHI V, COGRANNE R, FRIDRICH J . Content-adaptive Steganography by Minimizing Statistical Detectability[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2):221-234.
doi: 10.1109/TIFS.2015.2486744
|
[12] |
LI B, WANG M, LI X L , et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9):1905-1917.
doi: 10.1109/TIFS.2015.2434600
|
[13] |
KODOVSKY J, FRIDRICH J. Steganalysis of JPEG Images Using Rich Models [C]//Proceedings of the SPIE: 8303. Bellingham: SPIE, 2012: 83030A.
|
[14] |
刘如意, 宋建锋, 权义宁 , 等. 一种自动的高分辨率遥感影像道路提取方法[J]. 西安电子科技大学学报, 2017,44(1):100-105.
doi: 10.3969/j.issn.1001-2400.2017.01.018
|
|
LIU Ruyi, SONG Jianfeng, QUAN Yining , et al . Automatic Road Extraction Method for High-resolution Remote Sensing Images[J]. Journal of Xidian University , 2017,44(1):100-105.
doi: 10.3969/j.issn.1001-2400.2017.01.018
|
[15] |
DENEMARK T, SEDIGHI V, HOLUB V, et al. Selection-channel-aware Rich Model for Steganalysis of Digital Images [C]//Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE, 2014: 48-53.
|