Computer Science ›› 2024, Vol. 51 ›› Issue (5): 321-330.doi: 10.11896/jsjkx.231000036
• Information Security • Previous Articles Next Articles
ZHANG Jinghan, CHEN Wen
CLC Number:
[1]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiersfor steganalysis ofdigital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444. [2]QIN C,ZHANG W,CAO F,et al.Separable reversible data hi-ding in encrypted images via adaptive embedding strategy with block selection[J].Signal Processing,2018,153:109-122. [3]SONG X,LIU F,YANG C,et al.Steganalysis of adaptive JPEG steganography using 2D Gabor filters[C]//Proceedings of the 3rd ACM Workshop on Information hiding and Multimedia Security.2015:15-23. [4]HOLUB V,FRIDRICH J.Random projections of residuals fordigital image steganalysis[J].IEEE Transactions on Information Forensics and Security,2013,8(12):1996-2006. [5]BOROUMAND M,CHEN M,FRIDRICH J.Deep residual network for steganalysis of digital images[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1181-1193. [6]VAISHNAVI D,SUBASHINI T S.Robust and invisible image watermarking in RGB color space using SVD[J].Procedia Computer Science,2015,46:1770-1777. [7]LIN S D,SHIE S C,GUO J Y.Improving the robustness of DCT-based image watermarking against JPEG compression[J].Computer Standards & Interfaces,2010,32(1/2):54-60. [8]PREDA R O,VIZIREANU D N.Watermarking-based image authentication robust to JPEG compression[J].Electronics Letters,2015,51(23):1873-1875. [9]JIA Z,FANG H,ZHANG W.Mbrs:Enhancing robustness ofdnn-based watermarking by mini-batch of real and simulated jpeg compression[C]//Proceedings of the 29th ACM International Conference on Multimedia.2021:41-49. [10]ZHANG Y,LUO X,YANG C,et al.A framework of adaptive steganography resisting JPEG compression and detection[J].Security and Communication Networks,2016,9(15):2957-2971. [11]ZHANG Y,ZHU X,QIN C,et al.Dither modulation basedadaptive steganography resisting JPEG compression and statistic detection[J].Multimedia Tools and Applications,2018,77:17913-17935. [12]ZHANG Y,LUO X,ZHU X,et al.Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes[J].Journal of Real-Time Image Processing,2020,17:115-123. [13]YU X,CHEN K,WANG Y,et al.Robust adaptive steganography based on generalized dither modulation and expanded embedding domain[J].Signal Processing,2020,168:107343. [14]LI F,WU K,QIN C,et al.Anti-compression JPEG steganography overrepetitive compression networks[J].Signal Processing,2020,170:107454. [15]QIAO T,WANG S,LUO X,et al.Robust steganography resisting JPEG compression by improving selection of cover element[J].Signal Processing,2021,183:108048. [16]BAO Z,GUO Y,LI X,et al.A robust image steganographybased on the concatenated error correction encoder and discrete cosine transform coefficients[J].Journal of Ambient Intelligence and Humanized Computing,2020,11:1889-1901. [17]TAO J,LI S,ZHANG X,et al.Towards robust image steganography[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,29(2):594-600. [18]ZHAO Z,GUAN Q,ZHANG H,et al.Improving the robustness of adaptive steganographic algorithms based on transport channel matching[J].IEEE Transactions on Information Forensics and Security,2018,14(7):1843-1856. [19]LU W,ZHANG J,ZHAO X,et al.Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,31(7):2909-2922. [20]BALUJA S.Hiding images within images[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,42(7):1685-1697. [21]LU S P,WANG R,ZHONG T,et al.Large-capacity image steganography based on invertible neural networks[C]//Procee-dings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:10816-10825. [22]XU Y,MOU C,HU Y,et al.Robust invertible image steganography[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:7875-7884. [23]GUAN Z,JING J,DENG X,et al.DeepMIH:Deep invertible network for multiple image hiding[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2022,45(1):372-390. [24]LI Q,WANG X,MA B,et al.Image steganography based onstyle transfer and quaternion exponent moments[J].Applied Soft Computing,2021,110:107618. [25]HU D,WANG L,JIANG W,et al.A novel image steganography method via deep convolutional generative adversarial networks[J].IEEE Access,2018,6:38303-38314. [26]WEI P,LI S,ZHANG X,et al.Generative steganography network[C]//Proceedings of the 30th ACM International Confe-rence on Multimedia.2022:1621-1629. [27]LIU X,MA Z,MA J,et al.Image disentanglement autoencoder for steganography without embedding[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2022:2303-2312. [28]BAS P,FILLER T,PEVNY' T.“Break our steganographic system”:the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2011:59-70. [29]TIWARI K,GANGURDE S J.LSB steganography using pixel locator sequence with AES[C]//2021 2nd International Confe-rence on Secure Cyber Computing and Communications(ICSCCC).IEEE,2021:302-307. [30]MUKHOPADHYAY S,HOSSAIN S,GHOSAL S K,et al.Secured image steganography based on Catalan transform[J].Multimedia Tools and Applications,2021,80:14495-14520. [31]KISHORE V,CHEN X,WANG Y,et al.Fixed neural network steganography:Train the images,not the network[C]//International Conference on Learning Representations.2021. [32]BUI T,AGARWAL S,YU N,et al.RoSteALS:Robust Stega-nography using Autoencoder Latent Space[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:933-942. [33]BOEHM B.Stegexpose-A tool for detecting LSB steganography[J].arXiv:1410.6656,2014. [34]FRIDRICH J,KODOVSKY J.Rich models for steganalysis of digital images[J].IEEE Transactions on information Forensics and Security,2012,7(3):868-882. [35]DUMITRESCU S,WU X,WANG Z.Detection of LSB stega-nography via sample pair analysis[C]//Information Hiding:5th International Workshop,IH 2002 Noordwijkerhout,The Netherlands,October 7-9,2002 Revised Papers 5.Berlin,Heidelberg:Springer,2003:355-372. [36]FRIDRICH J,GOLJAN M.Practical steganalysis of digital images:state of the art[J].Security and Watermarking of Multimedia Contents IV,2002,4675:1-13. [37]WESTFELD A.Detecting low embedding rates[C]//Interna-tionalWorkshop on Information Hiding.Berlin,Heidelberg:Springer,2002:324-339. [38]DUMITRESCU S,WU X,MEMON N.On steganalysis of random LSB embedding in continuous-tone images[C]//Procee-dings International Conference on Image Processing.IEEE,2002,3:641-644. [39]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics and Security,2011,7(2):432-444. |
[1] | SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315. |
[2] | Peng QiuMing;Yang XiaoFan;Huang Song;Li SaiJing;Bai Sen. [J]. Computer Science, 2005, 32(8): 63-66. |
|