[1] AlGHAMDI S, WIN K T, VlAHU-GJORGIEVSKA E.
Information security governance challenges and critical success
factors: Systematic review[J]. Computers & security, 2020, 99:
102030-102068.
[2] RUSTAD S, ANDONO P N, SHIDIK G F. Digital image
steganography survey and investigation (goal, assessment,
method, development, and dataset) [J]. Signal Processing, 2022,
206: 108908-108935.
[3] 付章杰, 王帆, 孙星明, 等. 基于深度学习的图像隐写方法研究
[J]. 计算机学报, 2020, 43(9):1656-1672.
FU Z-J, WANG F, SUN X-M, WANG Y, et al. Research on
steganography of digital Images based on deep learning[J].
Chinese Journal of Computers,2020,43(9):1656-1672. (in
Chinese)
[4] JUNG K H, YOO K Y. Steganographic method based on
interpolation and LSB substitution of digital images[J].
Multimedia Tools and Applications, 2015, 74: 2143-2155. [5] 廖琪男. 利用模运算及其周期性特点的安全隐写算法[J]. 中国
图象图形学报, 2012, 17(10): 1206-1212.
LIAO Q N. Secure steganography based on modulo and its
cyclical characteristic[J].Journal of Image and Graphics, 2012,
17(10): 1206-1212.(in Chinese)
[6] JIA Y, YIN Z, ZHANG X, et al. Reversible data hiding based on
reducing invalid shifting of pixels in histogram shifting[J]. Signal
Processing, 2019, 163: 238-246.
[7] 苏炯铭,刘鸿福,项凤涛,等.深度神经网络解释方法综述[J].计算
机工程,2020,46(09):1-15.
SU J M, LIU H F, XIANG F T, et al. Survey of interpretation
methods for deep neural networks[J]. Computer
Engineering,2020,46(09):1-15. (in Chinese)
[8] LECUN Y, BENGIO Y, HINTONG. Deep learning[J]. Nature,
2015, 521(7553): 436-444.
[9] 张珂,冯晓晗,郭玉荣,等.图像分类的深度卷积神经网络模型综
述[J].中国图像图形学报,2021,26(10):2305-2325.
ZHANG K, FENG X H, GUO Y R, et al. Overview of Deep
Convolutional Neural Networks for Image
Classification[J].Journal of Image and
Graphics,2021,26(10):2305-2325. (in Chinese)
[10] MASANA M, LIU X, TWARDOWSKI B, et al. Class-
incremental learning: survey and performance evaluation on
image classification[J]. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 2022, 45(5): 5513-5533.
[11] 陈科圻,朱志亮,邓小明,等.多尺度目标检测的深度学习研究综
述[J].软件学报,2021,32(04):1201-1227.
CHEN K Q, ZHU Z L, DENG X M, et al. Deep learning for
multi-scale object detection: a Survey[J]. Journal of
Software,2021,32(04):1201-1227. (in Chinese)
[12] CHENG G, YUAN X, YAO X, et al. Towards large-scale small
object detection: Survey and benchmarks[J]. IEEE Transactions
on Pattern Analysis and Machine Intelligence,
2023,45(11):13467-13488.
[13] 田萱,王亮,丁琪.基于深度学习的图像语义分割方法综述[J].软
件学报,2019,30(02):440-468.
TIAN X,WANG L,DING Q. Review of image semantic
segmentation based on deep learning[J]. Journal of Software,
2019,30(02):440-468. (in Chinese)
[14] MINAEE S, YURI B, FATIH P, et al. Image segmentation using
deep learning: a survey. IEEE Transactions on Pattern Analysis
and Machine Intelligence.2021,44(7): 3523-3542.
[15] 刘颖,程美,王富平,等.深度哈希图像检索方法综述[J]. 中国图
象图形学报, 2020, 25(07):1296-1317.
LIU Y,CHEN M,WANG F P, et al. Deep hashing image retrieval
methods[J].Journal of Image and Graphics, 2020, 25(07):1296-
1317. (in Chinese)
[16] DUBEY S R. A decade survey of content based image retrieval
using deep learning[J]. IEEE Transactions on Circuits and
Systems for Video Technology, 2021, 32(5): 2687-2704.
[17] BALUJA S. Hiding images within images[J]. IEEE Transactions
on Pattern Analysis and Machine Intelligence, 2019, 42(7): 1685-
1697.
[18] DUAN X, JIA K, LI B, et al. Reversible image steganography
scheme based on a U-Net structure[J]. IEEE Access, 2019, 7(1):
9314-9323.
[19] WU P, YANG Y, LI X. Stegnet: Mega image steganography
capacity with deep convolutional network[J]. Future Internet,
2018, 10(6): 56-70.
[20] RONNEBERGER O, FISCHER P, BROX T. U-Net:
Convolutional networks for biomedical image
segmentation[C]//International Conference on Medical Image
Computing and Computer-Assisted Intervention. 2015:234-241.
[21] ZHANG C, BENZ P, KARJAUY A, et al. Udh: Universal deep
hiding for steganography, watermarking, and light field
messaging[J]. Advances in Neural Information Processing
Systems, 2020, 33: 10223-10234.
[22] 袁超,王宏霞,何沛松.基于注意力机制的高容量通用图像隐写
模 型 [J/OL]. 软 件 学 报 ,1-13[2023-12-
27]https://doi.org/10.13328/j.cnki.jos.006815.
YUAN C, WANG H, and HE P. High-volume universal image
steganography model based on attention mechanism [J / OL].
Journal of Software, 1-13[2023-12-
27]https://doi.org/10.13328/j.cnki.jos.006815. (in Chinese)
[23] ZHONG N, QIAN Z, WANG Z, et al. Batch steganography via
generative network[J]. IEEE Transactions on Circuits and
Systems for Video Technology, 2020, 31(1): 88-97.
[24] LI L, ZHANG W, QIN C, et al. Adversarial batch image
steganography against CNN-based pooled steganalysis[J]. Signal
Processing, 2021, 181: 107920-107930.
[25] KOBYZEV I, PRINCE S J D, BRUBAKER M A. Normalizing
flows: An introduction and review of current methods[J]. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 2020,
43(11): 3964-3979.
[26] KINGMA D P, DHARIWAL P. Glow:Generative flow with
invertible 1x1 convolutions[J]. Advances in Neural Information
Processing Systems, 2018, 32, 31-40.
[27] LU S P, WANG R, ZHONG T, et al. Large-capacity image
steganography based on invertible neuralnetworks[C]//Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition. 2021: 10816-10825.
[28] JING J, DENG X, XU M, et al. HiNet: deep image hiding by
invertible network[C]//Proceedings of the IEEE/CVF
International Conference on Computer Vision. 2021: 4733-4742.
[29] XU Y, MOU C, HU Y, et al. Robust invertible image
steganography[C]//Proceedings of the IEEE/CVF Conference on
Computer Vision and Pattern Recognition. 2022: 7875-7884.
[30] LUO Y, ZHOU T, LIU F, et al. IRWArt: levering watermarking
performance for protecting high-quality artwork
images[C]//Proceedings of the ACM Web Conference 2023. 2023:
2340-2348.
[31] WOO S, PARK J, LEE J Y, et al. Cbam: Convolutional block
attention module[C]//Proceedings of the European Conference on
Computer Vision. 2018: 3-19.
[32] LIN T Y, MARIE M, BELONGIE S, et al. Microsoft coco:
Common objects in context[C]// Proceedings of the European
Conference on Computer Vision. 2014: 740-755.
[33] HUANG G, LIU Z, VAN DER MAATEN L, et al. Densely
connected convolutional networks[C]//Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition. 2017:
4700-4708.
[34] KINGMA D P, BA J. Adam: A method for
optimization[C]//International Conference on Learning
Representations. 2015:1-15.
[35] SELVARAJU R R, COGSWELL M, DAS A, et al. Grad-cam:
visual explanations from deep networks via gradient-based
localization[C]//Proceedings of the IEEE International
Conference on Computer Vision. 2017: 618-626.
|