4.6 Article

Invisible steganography via generative adversarial networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework

Jishen Zeng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Electrical & Electronic

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network

Weixuan Tang et al.

IEEE SIGNAL PROCESSING LETTERS (2017)

Article Computer Science, Theory & Methods

Deep Learning Hierarchical Representations for Image Steganalysis

Jian Ye et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Engineering, Electrical & Electronic

Loss Functions for Image Restoration With Neural Networks

Hang Zhao et al.

IEEE TRANSACTIONS ON COMPUTATIONAL IMAGING (2017)

Article Computer Science, Artificial Intelligence

Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition

Kaiming He et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2015)

Article Computer Science, Information Systems

Universal distortion function for steganography in an arbitrary domain

Vojtech Holub et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2014)

Article Computer Science, Theory & Methods

Rich Models for Steganalysis of Digital Images

Jessica Fridrich et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Artificial Intelligence

The Pascal Visual Object Classes (VOC) Challenge

Mark Everingham et al.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2010)

Article Computer Science, Artificial Intelligence

Image quality assessment: From error visibility to structural similarity

Z Wang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2004)