TY - JOUR AU - Petitcolas, F. A. AU - Anderson, R. J. AU - Kuhn, M. G. PY - 1999 DA - 1999// TI - Information hiding-a survey JO - Proc. IEEE VL - 87 UR - https://doi.org/10.1109/5.771065 DO - 10.1109/5.771065 ID - Petitcolas1999 ER - TY - STD TI - Y. Qian, J. Dong, W. Wang, T. Tan, in Proceedings of Media Watermarking, Security, and Forensics 2015: 9-11 February 2015; San Francisco, ed. by M. A. Adnan, D. M. Nasir, and D. H. Chad. Deep learning for steganalysis via convolutional neural networks (International Society for Optics and Photonics, 2015), pp. 171–180. ID - ref2 ER - TY - JOUR AU - Xu, G. AU - Wu, H. -. Z. AU - Shi, Y. -. Q. PY - 2016 DA - 2016// TI - Structural design of convolutional neural networks for steganalysis JO - IEEE Signal Proc. Lett. VL - 23 UR - https://doi.org/10.1109/LSP.2016.2548421 DO - 10.1109/LSP.2016.2548421 ID - Xu2016 ER - TY - JOUR AU - Ye, J. AU - Ni, J. AU - Yi, Y. PY - 2017 DA - 2017// TI - Deep learning hierarchical representations for image steganalysis JO - IEEE Trans. Inf. Forensics Secur. VL - 12 UR - https://doi.org/10.1109/TIFS.2017.2710946 DO - 10.1109/TIFS.2017.2710946 ID - Ye2017 ER - TY - JOUR AU - Boroumand, M. AU - Chen, M. AU - Fridrich, J. PY - 2018 DA - 2018// TI - Deep residual network for steganalysis of digital images JO - IEEE Trans. Inf. Forensics Secur. VL - 14 UR - https://doi.org/10.1109/TIFS.2018.2871749 DO - 10.1109/TIFS.2018.2871749 ID - Boroumand2018 ER - TY - JOUR AU - Fridrich, J. AU - Kodovsky, J. PY - 2012 DA - 2012// TI - Rich models for steganalysis of digital images JO - IEEE Trans. Inf. Forensics Secur. VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2190402 DO - 10.1109/TIFS.2012.2190402 ID - Fridrich2012 ER - TY - STD TI - T. Denemark, V. Sedighi, V. Holub, R. Cogranne, J. Fridrich, in Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security: 3-5 December 2014; Atlanta, ed. by Y. Sun, V. H. Zhao. Selection-channel-aware rich model for steganalysis of digital images (IEEE, 2014), pp. 48–53. ID - ref7 ER - TY - JOUR AU - Yang, Y. AU - Chen, Y. AU - Chen, Y. AU - Bi, W. PY - 2018 DA - 2018// TI - A novel universal steganalysis algorithm based on the iqm and the srm JO - Comput. Mater. Continua VL - 56 ID - Yang2018 ER - TY - JOUR AU - Duan, X. AU - Song, H. AU - Qin, C. AU - Khan, M. K. PY - 2018 DA - 2018// TI - Coverless steganography for digital images based on a generative model JO - Comput. Mater. and Continua VL - 55 ID - Duan2018 ER - TY - JOUR AU - Holub, V. AU - Fridrich, J. AU - Denemark, T. PY - 2014 DA - 2014// TI - Universal distortion function for steganography in an arbitrary domain JO - EURASIP J. Inf. Secur. VL - 2014 UR - https://doi.org/10.1186/1687-417X-2014-1 DO - 10.1186/1687-417X-2014-1 ID - Holub2014 ER - TY - STD TI - V. Holub, J. Fridrich, in Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security: 2-5 December 2012; Tenerife, ed. by P. Moulin, F. Pérez-González. Designing steganographic distortion using directional filters (IEEE, 2012), pp. 234–239. ID - ref11 ER - TY - STD TI - B. Li, M. Wang, J. Huang, X. Li, in Proceedings of the 2014 IEEE International conference on Image Processing: 27-30 October 2014; Paris, ed. by B. Pesquet-Popescu, J. Fowler. A new cost function for spatial image steganography (IEEE, 2014), pp. 4206–4210. ID - ref12 ER - TY - JOUR AU - Tang, W. AU - Tan, S. AU - Li, B. AU - Huang, J. PY - 2017 DA - 2017// TI - Automatic steganographic distortion learning using a generative adversarial network JO - IEEE Signal Proc. Lett. VL - 24 UR - https://doi.org/10.1109/LSP.2017.2745572 DO - 10.1109/LSP.2017.2745572 ID - Tang2017 ER - TY - JOUR AU - Tang, W. AU - Li, B. AU - Tan, S. AU - Barni, M. AU - Huang, J. PY - 2019 DA - 2019// TI - CNN-based adversarial embedding for image steganography JO - IEEE Trans. Inf. Forensics Secur. VL - 14 UR - https://doi.org/10.1109/TIFS.2019.2891237 DO - 10.1109/TIFS.2019.2891237 ID - Tang2019 ER - TY - STD TI - J. Yang, K. Liu, X. Kang, E. K. Wong, Y. -Q. Shi, Spatial image steganography based on generative adversarial network. arXiv preprint arXiv:1804.07939 (2018). http://arxiv.org/abs/1804.07939. ID - ref15 ER - TY - STD TI - K. A. Zhang, A. Cuesta-Infante, L. Xu, K. Veeramachaneni, SteganoGAN: high capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019). http://arxiv.org/abs/1901.03892. ID - ref16 ER - TY - STD TI - S. Baluja, in Proceedings of Advances in Neural Information Processing Systems 30(NIPS 2017): 3-9 December 2017; Long Beach, ed. by I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett. Hiding images in plain sight: deep steganography (Curran Associates, Inc, 2017), pp. 2069–2079. ID - ref17 ER - TY - STD TI - A. Rehman, R. Rahim, S. Nadeem, S. Hussain, S. Roth, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018; Munich, ed. by Leal-Taixé L.End-to-end trained cnn encoder-decoder networks for image steganography (Springer International Publishing, 2019), pp. 723–729. ID - ref18 ER - TY - JOUR AU - Duan, X. AU - Jia, K. AU - Li, B. AU - Guo, D. AU - Zhang, E. AU - Qin, C. PY - 2019 DA - 2019// TI - Reversible image steganography scheme based on a U-Net structure JO - IEEE Access VL - 7 UR - https://doi.org/10.1109/ACCESS.2019.2891247 DO - 10.1109/ACCESS.2019.2891247 ID - Duan2019 ER - TY - JOUR AU - Zhang, R. AU - Dong, S. AU - Liu, J. PY - 2019 DA - 2019// TI - Invisible steganography via generative adversarial networks JO - Multimed. Tools Appl. VL - 78 UR - https://doi.org/10.1007/s11042-018-6951-z DO - 10.1007/s11042-018-6951-z ID - Zhang2019 ER - TY - STD TI - I. Goodfellow, J. Pouget-Abadie, M. Mehdi, B. Xu, D. Warde-Farely, S. Ozair, A. Courvile, Y. Bengio, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018; Munich, ed. by Z. Ghahramani, M. Welling, C. Cotes, N. D. Lawrence, and K. Q. Weinberger. Generative adversarial nets (Curran Associates, Inc., 2019), pp. 723–729. ID - ref21 ER - TY - STD TI - D. Volkhonskiy, B. Borisenko, E. Burnaev, Generative adversarial networks for image steganography (2016). https://openreview.net/references/pdf?id=HJODCvqex. UR - https://openreview.net/references/pdf?id=HJODCvqex ID - ref22 ER - TY - STD TI - J. Hayes, G. Danezis, in Proceedings of Advances in Neural Information Processing Systems 30(NIPS 2017): 3-9 December 2017; Long Beach, ed. by I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett. Generating steganographic images via adversarial training (Curran Associates, Inc., 2017), pp. 1954–1963. ID - ref23 ER - TY - JOUR AU - Meng, R. AU - Rice, S. G. AU - Wang, J. AU - Sun, X. PY - 2018 DA - 2018// TI - A fusion steganographic algorithm based on faster R-CNN JO - Comput. Mater. Continua VL - 55 ID - Meng2018 ER - TY - STD TI - J. Zhu, R. Kaplan, J. Johnson, F. Li, in Proceedings of the European Conference on Computer Vision (ECCV) Workshops: 8-14 September 2018; Munich, ed. by V. Ferrari, M. Hebert, C. Sminchisescu, and Y. Weiss. Hidden: hiding data with deep networks (Springer International Publishing, 2018), pp. 657–672. ID - ref25 ER - TY - JOUR AU - Wu, P. AU - Yang, Y. AU - Li, X. PY - 2018 DA - 2018// TI - Stegnet: mega image steganography capacity with deep convolutional network JO - Future Internet VL - 10 UR - https://doi.org/10.3390/fi10060054 DO - 10.3390/fi10060054 ID - Wu2018 ER - TY - STD TI - Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu, N. Yu, in Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security: 20-22 June 2018; Innsbruck, ed. by R. Böhme, C. Pasquini. Adversarial examples against deep neural network based steganalysis (Association for Computing Machinery, 2018), pp. 67–72. ID - ref27 ER - TY - STD TI - J. Deng, W. Dong, R. Socher, L. -J. Li, K. Li, F. Li, in Proceedings of the 2009 IEEE Conference Vision and Pattern Recognition: 20-25 June 2009; Miami, ed. by D. Huttenlcoher, G. Medioni, and J. Rehg. Imagenet: a large-scale hierarchical image database (IEEE, 2009), pp. 248–255. ID - ref28 ER - TY - JOUR AU - Wang, Z. AU - Bovik, A. C. AU - Sheikh, H. R. AU - Simoncelli, E. P. PY - 2004 DA - 2004// TI - Image quality assessment: from error visibility to structural similarity JO - IEEE Trans. Image Process. VL - 13 UR - https://doi.org/10.1109/TIP.2003.819861 DO - 10.1109/TIP.2003.819861 ID - Wang2004 ER -