相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning
Weixuan Tang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder
Zhong-Liang Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
T-Safe: Trustworthy Service Provisioning for IoT-Based Intelligent Transport Systems
Prajnamaya Dass et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Coverless information hiding based on the generation of anime characters
Yi Cao et al.
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2020)
An Embedding Cost Learning Framework Using GAN
Jianhua Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Coverless image steganography using partial-duplicate image retrieval
Zhili Zhou et al.
SOFT COMPUTING (2019)
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
Zhong-Liang Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
A novel coverless information hiding method based on the average pixel value of the sub-images
Liming Zou et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images
Sheng Li et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification
Xiang Zhang et al.
IEEE TRANSACTIONS ON MULTIMEDIA (2018)
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Donghui Hu et al.
IEEE ACCESS (2018)
Industrial IoT in 5G environment towards smart manufacturing
Jiangfeng Cheng et al.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2018)
Smart City and IoT
Tai-hoon Kim et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Structural Design of Convolutional Neural Networks for Steganalysis
Guanshuo Xu et al.
IEEE SIGNAL PROCESSING LETTERS (2016)
Content-Adaptive Steganography by Minimizing Statistical Detectability
Vahid Sedighi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Coverless Multi-keywords Information Hiding Method Based on Text
Zhili Zhou et al.
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2016)
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Steganography Using Reversible Texture Synthesis
Kuo-Chen Wu et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)
Universal distortion function for steganography in an arbitrary domain
Vojtech Holub et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2014)
Rich Models for Steganalysis of Digital Images
Jessica Fridrich et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
Tomas Filler et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
The Internet of Things: A survey
Luigi Atzori et al.
COMPUTER NETWORKS (2010)
LSB matching revisited
J Mielikainen
IEEE SIGNAL PROCESSING LETTERS (2006)
Hiding data in images by simple LSB substitution
CK Chan et al.
PATTERN RECOGNITION (2004)