4.7 Article

An encrypted coverless information hiding method based on generative models

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A New Payload Partition Strategy in Color Image Steganography

Xin Liao et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2020)

Article Computer Science, Artificial Intelligence

Hiding Images within Images

Shumeet Baluja

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2020)

Article Computer Science, Information Systems

Pscenegan: Multi-Domain Particular Scenes Generation Based on Conditional Generative Adversarial Networks

Li-Li Jia et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Reversible Image Steganography Scheme Based on a U-Net Structure

Xintao Duan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Engineering, Electrical & Electronic

Deep learning for automatic stereotypical motor movement detection using wearable sensors in autism spectrum disorders

Nastaran Mohammadian Rad et al.

SIGNAL PROCESSING (2018)

Article Computer Science, Artificial Intelligence

Comments and Corrections Comments on Steganography Using Reversible Texture Synthesis

Hang Zhou et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2017)

Article Engineering, Electrical & Electronic

Structural Design of Convolutional Neural Networks for Steganalysis

Guanshuo Xu et al.

IEEE SIGNAL PROCESSING LETTERS (2016)

Article Computer Science, Information Systems

Reversible Data Hiding: Advances in the Past Two Decades

Yun-Qing Shi et al.

IEEE ACCESS (2016)

Article Computer Science, Artificial Intelligence

Steganography Using Reversible Texture Synthesis

Kuo-Chen Wu et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Theory & Methods

Steganalysis by Subtractive Pixel Adjacency Matrix

Tomas Pevny et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Review Engineering, Electrical & Electronic

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad et al.

SIGNAL PROCESSING (2010)