Computer Science ›› 2024, Vol. 51 ›› Issue (2): 343-351.doi: 10.11896/jsjkx.221200121
• Information Security • Previous Articles Next Articles
HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui
CLC Number:
[1]LIU S W,DU Q Z,LONG H,et al.Robust Audio WatermarkBased on QR Code[J].Journal of Chinese Computer Systems,2022,43(7):1535-1540. [2]LI X Y,ZHOU X B,LIU Z.High-capacity and robust image wa-termarking algorithm[J].Journal of Jilin University(Enginee-ring and Technology Edition),2022,52(1):174-179. [3]FANG H,ZHANG W,ZHOU H,et al.Screen-shooting resilient watermarking[J].IEEE Transactions on Information Forensics and Security,2018,14(6):1403-1418. [4]ZHU J,KAPLAN R,JOHNSON J,et al.Hidden:Hiding data with deep networks[C]//Proceedings of the European Confe-rence on Computer Vision(ECCV).2018:657-672. [5]JOHNSON N F,JAJODIA S.Exploring steganography:Seeing the unseen[J].Computer,1998,31(2):26-34. [6]SHEISI H,MESGARIAN J,RAHMANI M.Stegano-graphy:Dct coefficient replacement method and compare with JSteg algorithm[J].International Journal of Computer and Electrical Engineering,2012,4(4):458-462. [7]KUNDUR D,HATZINAKOS D.A robust digital image watermarking method using wavelet-based fusion[C]//Proceedings of International Conference on Image Processing.IEEE,1997,1:544-547. [8]FANG H,CHEN D,HUANG Q,et al.Deep template-based watermarking[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(4):1436-1451. [9]ZHONG X,HUANG P C,MASTORAKIS S,et al.An automated and robust image watermarking scheme based on deep neural networks[J].IEEE Transactions on Multimedia,2020,23:1951-1961. [10]ZHANG C,BENZ P,KARJAUV A,et al.Udh:Universal deep hiding for steganography,watermarking,and light field messaging[J].Advances in Neural Information Processing Systems,2020,33:10223-10234. [11]TANCIK M,MILDENHALL B,NG R.Stegastamp:Invisiblehyperlinks in physical photo-graphs[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:2117-2126. [12]JIA J,GAO Z,CHEN K,et al.RIHOOP:robust invisible hyperlinks in offline and online photo-graphs[J].IEEE Transactions on Cybernetics,2020:7094-7106. [13]WENGROWSKI E,DANA K.Light field messaging with deep photographic steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2019:1515-1524. [14]CHENG Y,JI X,WANG L,et al.{mID}:Tracing screen photos via {Moiré} patterns[C]//30th USENIX Security Symposium(USENIX Security 21).2021:2969-2986. [15]GUGELMANN D,SOMMER D,LENDERS V,et al.Screen watermarking for data theft investigation and attribution[C]//2018 10th International Conference on Cyber Conflict(CyCon).IEEE,2018:391-408. [16]FANG H,CHEN D,WANG F,et al.TERA:Screen-to-Camera Image Code with Transparency,Efficiency,Robustness and Adaptability[J].IEEE Transactions on Multimedia,2021,24:955-967. [17]RONNEBERGER O,FISCHER P,BROX T.Convolutional networks for biomedical image segmentation[C]//Medical Image Computing and Computer-Assisted Intervention.2015:234-241. [18]ZHANG R,ISOLA P,EFROS A A,et al.The unreason-able effectiveness of deep features as aperceptual metric[C]//Procee-dings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:586-595. [19]HUISKES M J,LEW M S.The mir flickr retrieval evaluation[C]//Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval.2008:39-43. [20]KINGMA D P,BA J.Adam:A method for stochastic optimization[J].arXiv:1412.6980,2014. |
[1] | CHEN Runhuan, DAI Hua, ZHENG Guineng, LI Hui , YANG Geng. Urban Electricity Load Forecasting Method Based on Discrepancy Compensation and Short-termSampling Contrastive Loss [J]. Computer Science, 2024, 51(4): 158-164. |
[2] | LIN Binwei, YU Zhiyong, HUANG Fangwan, GUO Xianwei. Data Completion and Prediction of Street Parking Spaces Based on Transformer [J]. Computer Science, 2024, 51(4): 165-173. |
[3] | SONG Hao, MAO Kuanmin, ZHU Zhou. Algorithm of Stereo Matching Based on GAANET [J]. Computer Science, 2024, 51(4): 229-235. |
[4] |
XUE Jinqiang, WU Qin.
Progressive Multi-stage Image Denoising Algorithm Combining Convolutional Neural Network and Multi-layer Perceptron [J]. Computer Science, 2024, 51(4): 243-253. |
[5] | CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359. |
[6] | HUANG Kun, SUN Weiwei. Traffic Speed Forecasting Algorithm Based on Missing Data [J]. Computer Science, 2024, 51(3): 72-80. |
[7] | ZHENG Cheng, SHI Jingwei, WEI Suhua, CHENG Jiaming. Dual Feature Adaptive Fusion Network Based on Dependency Type Pruning for Aspect-basedSentiment Analysis [J]. Computer Science, 2024, 51(3): 205-213. |
[8] | HUANG Wenke, TENG Fei, WANG Zidan, FENG Li. Image Segmentation Based on Deep Learning:A Survey [J]. Computer Science, 2024, 51(2): 107-116. |
[9] | CAI Jiacheng, DONG Fangmin, SUN Shuifa, TANG Yongheng. Unsupervised Learning of Monocular Depth Estimation:A Survey [J]. Computer Science, 2024, 51(2): 117-134. |
[10] | ZHANG Feng, HUANG Shixin, HUA Qiang, DONG Chunru. Novel Image Classification Model Based on Depth-wise Convolution Neural Network andVisual Transformer [J]. Computer Science, 2024, 51(2): 196-204. |
[11] | WANG Yangmin, HU Chengyu, YAN Xuesong, ZENG Deze. Study on Deep Reinforcement Learning for Energy-aware Virtual Machine Scheduling [J]. Computer Science, 2024, 51(2): 293-299. |
[12] | HOU Jing, DENG Xiaomei, HAN Pengwu. Survey on Domain Limited Relation Extraction [J]. Computer Science, 2024, 51(1): 252-265. |
[13] | YAN Zhihao, ZHOU Zhangbing, LI Xiaocui. Survey on Generative Diffusion Model [J]. Computer Science, 2024, 51(1): 273-283. |
[14] | GE Huibin, WANG Dexin, ZHENG Tao, ZHANG Ting, XIONG Deyi. Study on Model Migration of Natural Language Processing for Domestic Deep Learning Platform [J]. Computer Science, 2024, 51(1): 50-59. |
[15] | JING Yeyiran, YU Zeng, SHI Yunxiao, LI Tianrui. Review of Unsupervised Domain Adaptive Person Re-identification Based on Pseudo-labels [J]. Computer Science, 2024, 51(1): 72-83. |
|