1 |
VEERA MANINDRA A P, KARTHIKEYAN B. OTP camouflaging using LSB steganography and public key cryptography[C]//Proceedings of the 3rd International Conference on Electronics and Sustainable Communication Systems. Washington D. C., USA: IEEE Press, 2022: 109-115.
|
2 |
HASSABALLAH M, ABDEL HAMEED M, AWAD A I, et al. A novel image steganography method for industrial Internet of things security. IEEE Transactions on Industrial Informatics, 2021, 17(11): 7743- 7751.
doi: 10.1109/TII.2021.3053595
|
3 |
MOHSIN A H, ZAIDAN A A, ZAIDAN B B, et al. PSO: blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimedia Tools and Applications, 2021, 80(9): 14137- 14161.
doi: 10.1007/s11042-020-10284-y
|
4 |
RAHMAN S, MASOOD F, ULLAH KHAN W, et al. A novel approach of image steganography for secure communication based on LSB substitution technique. Computers, Materials & Continua, 2020, 64(1): 31- 61.
|
5 |
VOLETI L, BALAJEE R M, VALLEPU S K, et al. A secure image steganography using improved LSB technique and Vigenere cipher algorithm[C]//Proceedings of International Conference on Artificial Intelligence and Smart Systems. Washington D. C., USA: IEEE Press, 2021: 1005-1010.
|
6 |
KUMAR M, SONI A, SHEKHAWAT A R S, et al. Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique[C]//Proceedings of the 2nd International Conference on Artificial Intelligence and Smart Energy. Washington D. C., USA: IEEE Press, 2022: 1453-1457.
|
7 |
ALI H A, JALIL A J, HUSSEIN M K. Vernam encryption and steganography of a number of images in the digital video[C]//Proceedings of International Conference on Electrical, Computer, Communications and Mechatronics Engineering. Washington D. C., USA: IEEE Press, 2021: 1-6.
|
8 |
QIN X H, LI B, HUANG J W. A new spatial steganographic scheme by modeling image residuals with multivariate Gaussian model[C]//Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. Washington D. C., USA: IEEE Press, 2019: 2617-2621.
|
9 |
余恒, 王让定, 严迪群, 等. 基于采样值排序的音频可逆隐写算法. 计算机工程, 2021, 47(1): 123-128, 138.
URL
|
|
YU H, WANG R D, YAN D Q, et al. Reversible audio steganography algorithm based on sample value ordering. Computer Engineering, 2021, 47(1): 123-128, 138.
URL
|
10 |
张祎, 罗向阳, 王金伟, 等. 数字图像鲁棒隐写综述. 中国图象图形学报, 2022, 27(1): 3- 26.
URL
|
|
ZHANG Y, LUO X Y, WANG J W, et al. Research progress on digital image robust steganography. Journal of Image and Graphics, 2022, 27(1): 3- 26.
URL
|
11 |
刘帅威, 李智, 王国美, 等. 基于Transformer和GAN的对抗样本生成算法. 计算机工程, 2024, 50(2): 180- 187.
URL
|
|
LIU S W, LI Z, WANG G M, et al. Adversarial example generation algorithm based on transformer and GAN. Computer Engineering, 2024, 50(2): 180- 187.
URL
|
12 |
高培贤, 魏立线, 刘佳, 等. 针对图像隐写分析的卷积神经网络结构改进. 计算机工程, 2018, 44(10): 309- 313.
URL
|
|
GAO P X, WEI L X, LIU J, et al. Improvement of convolutional neural network structure for image steganalysis. Computer Engineering, 2018, 44(10): 309- 313.
URL
|
13 |
TANG W X, TAN S Q, LI B, et al. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters, 2017, 24(10): 1547- 1551.
doi: 10.1109/LSP.2017.2745572
|
14 |
YANG J H, RUAN D Y, HUANG J W, et al. An embedding cost learning framework using GAN. IEEE Transactions on Information Forensics and Security, 2020, 15, 839- 851.
doi: 10.1109/TIFS.2019.2922229
|
15 |
TANG W X, LI B, BARNI M, et al. An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Transactions on Information Forensics and Security, 2021, 16, 952- 967.
doi: 10.1109/TIFS.2020.3025438
|
16 |
XU G S, WU H Z, SHI Y Q. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters, 2016, 23(5): 708- 712.
doi: 10.1109/LSP.2016.2548421
|
17 |
MO X B, TAN S Q, LI B, et al. MCTSteg: a Monte Carlo tree search-based reinforcement learning framework for universal non-additive steganography. IEEE Transactions on Information Forensics and Security, 2021, 16, 4306- 4320.
doi: 10.1109/TIFS.2021.3104140
|
18 |
ZHANG H, ZU K K, LU J, et al. EPSANet: an efficient pyramid squeeze attention block on convolutional neural network[M]. Berlin, Germany: Springer, 2023.
|
19 |
BAS P, FILLER T, PEVNY T. Break our steganographic system: the ins and outs of organizing BOSS[M]. Berlin, Germany: Springer, 2011.
|
20 |
WANG Z C, FENG G R, SHEN L Q, et al. Cover selection for steganography using image similarity. IEEE Transactions on Dependable and Secure Computing, 2022, 20(3): 2328- 2340.
|
21 |
DENG J, DONG W, SOCHER R, et al. ImageNet: a large-scale hierarchical image database[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Washington D. C., USA: IEEE Press, 2009: 248-255.
|
22 |
DUAN X, LIU N, GOU M, et al. SteganoCNN: image steganography with generalization ability based on convolutional neural network. Entropy, 2020, 22(10): e1140.
doi: 10.3390/e22101140
|
23 |
FRIDRICH J, KODOVSKY J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868- 882.
doi: 10.1109/TIFS.2012.2190402
|
24 |
DENEMARK T, SEDIGHI V, HOLUB V, et al. Selection-channel-aware rich model for steganalysis of digital images[C]//Proceedings of IEEE International Workshop on Information Forensics and Security. Washington D. C., USA: IEEE Press, 2014: 48-53.
|
25 |
YE J, NI J Q, YI Y. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2545- 2557.
doi: 10.1109/TIFS.2017.2710946
|
26 |
WANG Z, FENG G, QIAN Z, et al. JPEG steganography with content similarity evaluation. IEEE Transactions on Cybernetics, 2023, 53(8): 5082- 5093.
doi: 10.1109/TCYB.2022.3155732
|
27 |
QIAO T, LUO X Y, WU T, et al. Adaptive steganalysis based on statistical model of quantized DCT coefficients for JPEG images. IEEE Transactions on Dependable and Secure Computing, 2021, 18(6): 2736- 2751.
doi: 10.1109/TDSC.2019.2962672
|
28 |
TANG W X, LI B, LI W X, et al. Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Science China Information Sciences, 2023, 66(3): 132305.
doi: 10.1007/s11432-021-3453-5
|
29 |
SONG T T, LIU M L, LUO W Q, et al. Enhancing image steganography via stego generation and selection[C]//Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. Washington D. C., USA: IEEE Press, 2021: 2695-2699.
|
30 |
LUO J, HE P S, LIU J Y, et al. Content-adaptive adversarial embedding for image steganography using deep reinforcement learning[C]//Proceedings of IEEE International Conference on Multimedia and Expo. Washington D. C., USA: IEEE Press, 2023: 49-54.
|
31 |
LI B, WANG M, HUANG J W, et al. A new cost function for spatial image steganography[C]//Proceedings of IEEE International Conference on Image Processing. Washington D. C., USA: IEEE Press, 2014: 4206-4210.
|