參考文獻 |
[1] J. J. M. S. C. Watkins, Dept of Electronics and U. o. S. CS, SO17 1BJ, UK, "Steganography-Messages Hidden in Bits," Multimedia Systems Coursework, 2001.
[2] C.-K. Chan and L.-M. J. P. r. Cheng, "Hiding data in images by simple LSB substitution," Pattern recognition, vol. 37, no. 3, pp. 469-474, 2004.
[3] P. Tsai, Y.-C. Hu, and H.-L. J. S. p. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal processing, vol. 89, no. 6, pp. 1129-1143, 2009.
[4] K. A. Zhang, A. Cuesta-Infante, L. Xu, and K. J. a. p. a. Veeramachaneni, "SteganoGAN: High capacity image steganography with GANs," arXiv preprint arXiv:1901.03892, 2019.
[5] J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, "Hidden: Hiding data with deep networks," in Proceedings of the European conference on computer vision (ECCV), 2018, pp. 657-672.
[6] S.-P. Lu, R. Wang, T. Zhong, and P. L. Rosin, "Large-capacity image steganography based on invertible neural networks," in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2021, pp. 10816-10825.
[7] J. Jing, X. Deng, M. Xu, J. Wang, and Z. Guan, "Hinet: Deep image hiding by invertible network," in Proceedings of the IEEE/CVF international conference on computer vision, 2021, pp. 4733-4742.
[8] L. Dinh, D. Krueger, and Y. J. a. p. a. Bengio, "Nice: Non-linear independent components estimation," arXiv preprint arXiv:1410.8516, 2014.
[9] S. Imaizumi and K. Ozawa, "Multibit embedding algorithm for steganography of palette-based images," in Image and Video Technology: 6th Pacific-Rim Symposium, PSIVT 2013, Guanajuato, Mexico, October 28-November 1, 2013. Proceedings 6, 2014, pp. 99-110: Springer.
[10] F. Pan, J. Li, and X. Yang, "Image steganography method based on PVD and modulus function," in 2011 International Conference on Electronics, Communications and Control (ICECC), 2011, pp. 282-284: IEEE.
[11] J. Fridrich, M. Goljan, and R. J. I. m. Du, "Detecting LSB steganography in color, and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, 2001.
[12] T. A. Hawi, M. Qutayri, and H. Barada, "Steganalysis attacks on stego-images using stego-signatures and statistical image properties," in 2004 IEEE Region 10 Conference TENCON 2004., 2004, pp. 104-107: IEEE.
[13] C.-T. Hsu and J.-L. J. I. T. o. i. p. Wu, "Hidden digital watermarks in images," IEEE Transactions on Image Processing, vol. 8, no. 1, pp. 58-68, 1999.
[14] J. Ruanaidh, W. J. Dowling, and F. M. Boland, "Phase watermarking of digital images," in Proceedings of 3rd IEEE International Conference on Image Processing, 1996, vol. 3, pp. 239-242: IEEE.
[15] M. Barni, F. Bartolini, and A. J. I. t. o. i. p. Piva, "Improved wavelet-based watermarking through pixel-wise masking," IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 783-791, 2001.
[16] P.-C. Su and C.-C. J. I. T. o. C. E. Kuo, "Steganography in JPEG2000 compressed images," IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 824-832, 2003.
[17] S. J. A. i. n. i. p. s. Baluja, "Hiding images in plain sight: Deep steganography," Advances in neural information processing systems, vol. 30, 2017.
[18] S. J. I. t. o. p. a. Baluja and m. intelligence, "Hiding images within images," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 7, pp. 1685-1697, 2019.
[19] M. Tancik, B. Mildenhall, and R. Ng, "Stegastamp: Invisible hyperlinks in physical photographs," in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2020, pp. 2117-2126.
[20] X. Weng, Y. Li, L. Chi, and Y. Mu, "High-capacity convolutional video steganography with temporal residual modeling," in Proceedings of the 2019 on international conference on multimedia retrieval, 2019, pp. 87-95.
[21] D. P. Kingma and P. J. A. i. n. i. p. s. Dhariwal, "Glow: Generative flow with invertible 1x1 convolutions," arXiv preprint arXiv:1807.03039, vol. 31, 2018.
[22] H. Yang, Y. Xu, X. Liu, and X. J. E. A. o. A. I. Ma, "PRIS: Practical robust invertible network for image steganography," Engineering Applications of Artificial Intelligence, vol. 133, p. 108419, 2024.
[23] Y. Xu, C. Mou, Y. Hu, J. Xie, and J. Zhang, "Robust invertible image steganography," in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 7875-7884.
[24] X. Wang et al., "Esrgan: Enhanced super-resolution generative adversarial networks," in Proceedings of the European conference on computer vision (ECCV) workshops, 2018, pp. 0-0.
[25] E. Agustsson and R. Timofte, "Ntire 2017 challenge on single image super-resolution: Dataset and study," in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, 2017, pp. 126-135.
[26] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, "Imagenet: A large-scale hierarchical image database," in 2009 IEEE conference on computer vision and pattern recognition, 2009, pp. 248-255: Ieee.
[27] T.-Y. Lin et al., "Microsoft coco: Common objects in context," in Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, 2014, pp. 740-755: Springer.
[28] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770-778. |