|
基于最小值滤波与感知哈希算法的图像隐写算法
|
Abstract:
[1] | Li, B., Tan, S., Ming, W., et al. (2014) Investigation on Cost Assignment in Spatial Image Steganography. IEEE Transactions on Information Forensics & Security, 9, 1264-1277. https://doi.org/10.1109/TIFS.2014.2326954 |
[2] | Tang, W., Tan, S., Li, B., et al. (2017) Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Processing Letters, 24, 1547-1551. https://doi.org/10.1109/LSP.2017.2745572 |
[3] | Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., et al. (2014) Generative Adversarial Nets. International Conference on Neural Information Processing Systems, 2672-2680. |
[4] | Tang, W., Li, B. and Tan, S. (2019) CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography. IEEE Transactions on Information Forensics and Security, 14, 2074-2087.
https://doi.org/10.1109/TIFS.2019.2891237 |
[5] | Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 234-239.
https://doi.org/10.1109/WIFS.2012.6412655 |
[6] | Fridrich, J. and Kodovsky, J. (2013) Multivariate Gaussian Model for Designing Additive Distortion for Steganography: 2013 IEEE International Conference on Acoustics, Vancouver, 2949-2953.
https://doi.org/10.1109/ICASSP.2013.6638198 |
[7] | Mukherjee, S. and Sanyal, G. (2019) Edge Based Image Steganography with Variable Threshold. Multimedia Tools and Applications, 78, 16363-16388. https://doi.org/10.1007/s11042-018-6975-4 |
[8] | Sedighi, V., Fridrich, J. and Cogranne, R. (2015) Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Proceedings of SPIE-The International Society for Optical Engineering, 9409, 1-13. https://doi.org/10.1117/12.2080272 |
[9] | Sedighi, V., Cogranne, R. and Fridrich, J. (2016) Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics & Security, 11, 221-234.
https://doi.org/10.1109/TIFS.2015.2486744 |
[10] | Li, B., Ming, W., Huang, J., et al. (2015) A New Cost Function for Spatial Image Steganography. 2015 IEEE International Conference on Image Processing, Quebec City, Canada, 27-30 September 2015, 4206-4210. |
[11] | Pevny, T., Bas, P. and Fridrich, J. (2010) Steganalysis by Subtractive Pixel Adja-cency Matrix. IEEE Transactions on Information Forensics & Security, 5, 215-224. https://doi.org/10.1109/TIFS.2010.2045842 |
[12] | Pevny, T. and Fridrich, J. (2008) Benchmarking for Steganography. https://doi.org/10.1007/978-3-540-88961-8_18 |
[13] | 郑传声. 基于最小化嵌入失真的空域图像隐写算法研究[D]: [硕士学位论文]. 北京: 北京邮电大学, 2018. |
[14] | Li, B., Ming, W., Li, X., et al. (2015) A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Transactions on Information Forensics & Security, 10, 1905-1917.
https://doi.org/10.1109/TIFS.2015.2434600 |
[15] | Subhedar, M.S. and Mankar, V.H. (2019) Image Steganography Us-ing Contourlet Transform and Matrix Decomposition Techniques. Multimedia Tools and Applications, 78, 22155-22181. https://doi.org/10.1007/s11042-019-7512-9 |
[16] | 张立国, 王松, 金梅, 等. 基于多尺度感知哈希特征的目标跟踪算法研究[J]. 高技术通讯, 2018, 28(3): 39-46. |
[17] | Ker, A.D. (2009) Estimating Steganographic Fisher Information in Real Images. In: Katzenbeisser, S. and Sadeghi, A.R., Eds., Information Hiding. IH 2009. Lecture Notes in Computer Science, Volume 5806, Springer, Berlin, Heidelberg, 73-88. https://doi.org/10.1007/978-3-642-04431-1_6 |
[18] | Bas, P., Filler, T. and Pevny, T. (2011) Break Our Steganographic System: The Ins and Outs of Organizing BOSS. In: Proceedings of International Conference on Information Hiding, Prague, Czech Republi, Springer-Verlag, Berlin, 58-70. https://doi.org/10.1007/978-3-642-24178-9_5 |
[19] | Kodovsky, J. and Fridrich, J. (2012) Rich Models for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 7, 868-882. https://doi.org/10.1109/TIFS.2012.2190402 |
[20] | Denemark, T., Sedighi, V., Holub, V., et al. (2014) Selection-Channel-Aware Rich Model for Steganalysis of Digital Images. 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 48-53.
https://doi.org/10.1109/WIFS.2014.7084302 |
[21] | Kodovsky, J., Fridrich, J. and Holub, V. (2012) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics & Security, 7, 432-444. https://doi.org/10.1109/TIFS.2011.2175919 |
[22] | Abdulla, A.A., Sellahewa, H. and Jassim, S.A. (2019) Improving Embedding Efficiency for Digital Steganography by Exploiting Similarities between Secret and Cover Images. Multi-media Tools and Applications, 78, 17799-17823.
https://doi.org/10.1007/s11042-019-7166-7 |