參考文獻 |
[1]Yunpeng Chen, et al. “Dual Path Networks”, arXiv preprint arXiv:1707.01083, 2017.
[2]Kaiming He, et al. “Deep residual learning for image recognition”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016.
[3]Gao Huang, et al. “Densely Connected Convolutional Networks”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2017.
[4]Mehdi Boroumand, et al. “Deep Residual Network for Steganalysis of Digital Images.”, Proceedings of the IEEE Transactions on Information Forensics and Security. 2019.
[5]S. M. Masud Karim, et al., “A new approach for LSB based image steganography using secret key”, 14th International Conference on Computer and Information Technology, 2011.
[6]D.G. Lowe, “Object recognition from local scale-invariant features,” Proceedings of the Seventh IEEE International Conference on Computer Vision: 1150–1157. 1999.
[7]Bin Li, et al., “A new cost function for spatial image steganography”, Proceedings of the IEEE International Conference on Image Processing (ICIP), 2014.
[8]Vojtěch Holub and Jessica Fridrich, “Designing steganographic distortion using directional filters”, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2012.
[9]Vojtech Holub, et al., “Universal distortion function for steganography in an arbitrary domain”, EURASIP Journal on Information Security, vol.2014, no. 1, Dec. 2014.
[10]Linjie Guo, et al., “An efficient JPEG steganographic scheme using uniform embedding”, Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS), 2012.
[11]Chang Wang and Jiangqun Ni, “An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients”, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 2012.
[12]Corinna Cortes and Vladimir Vapnik, “Support-vector networks”, Machine Learning. 20 (3): 273–297., 1995.
[13]Jan Kodovsky, at el., “Ensemble Classifiers for Steganalysis of Digital Media.”, Proceedings of the IEEE Transactions on Information Forensics and Security, vol.7, 2012.
[14]Jessica Fridrich, at el., “Breaking HUGO—The Process Discovery.”, Information Hiding-international Conference, pp. 85-101, 2011.
[15]Jan Kodovský and Jessica Fridrich, “Steganalysis in High Dimensions: Fusing Classifiers Built on Random Subspaces.”, Proceedings of SPIE—The International Society for Optical Engineering, pp. 181-197, 2011
[16] Jessica Fridrich and Jan Kodovsky, “Rich Models for Steganalysis of Digital Images.”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2012
[17]Vojtech Holub and Jessica Fridrich, “Random Projections of Residuals for Digital Image Steganalysis.”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2013
[18]Tomáš Pevny et al., “Steganalysis by subtractive pixel adjacency matrix”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2010.
[19]Vojtech Holub and Jessica Fridrich, “Random projections of residuals for digital image steganalysis.”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2013.
[20]Tomas Pevny and Jessica Fridrich, “Merging Markov and DCT features for multi-class JPEG steganalysis.”, Security, Steganography, and Watermarking of Multimedia Contents IX., 2007.
[21]Jan Kodovský and Jessica Fridrich, “Steganalysis of JPEG images using rich models”, Media Watermarking, Security, and Forensics, 2012.
[22]Vojtěch Holub and Jessica Fridrich, “Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT.”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2015.
[23]Vojtěch Holub and Jessica Fridrich, “Phase-aware projection model for steganalysis of JPEG images.”, Media Watermarking, Security, and Forensics, 2015.
[24]Xiaofeng Song, et al., “Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters”, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015.
[25]Tomas Denemark, et al., “Selection-channel-aware rich model for Steganalysis of digital images”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2014.
[26]Weixuan Tang, et al., “Adaptive steganalysis against WOW embedding algorithm.”, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp. 91-96, 2014.
[27]Yinlong Qian, et al., “Deep learning for steganalysis via convolutional neural networks.”, Media Watermarking, Security, and Forensics 2015, 2015.
[28]Guanshuo Xu, et al., “Structural Design of Convolutional Neural Networks for Steganalysis.”, Proceedings of the IEEE Signal Processing Letters, 2016.
[29]Jian Ye, et al., “Deep Learning Hierarchical Representations for Image Steganalysis.”, Proceedings of the IEEE Transactions on Information Forensics and Security, 2017.
[30]Guanshuo Xu, “Deep Convolutional Neural Network to Detect J-UNIWARD.”, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
[31]Mehdi Yedroudj, et al., “Yedrouj-Net: An efficient CNN for spatial steganalysis.”, International Conference on Acoustics, Speech and Signal Processing, 2018.
[32]Ru Zhang, et al., “Efficient feature learning and multi-size image steganalysis based on CNN.”, arXiv preprint arXiv:1807.11428, 2018.
[33]Christian Szegedy, et al., “Going Deeper With Convolutions.”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
[34]Christian Szegedy, et al., “Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning.”, AAAI Publications, Thirty-First AAAI Conference on Artificial Intelligence, 2017.
[35]Rohollah Soltani and Hui Jiang, “Higher order recurrent neural networks”. arXiv preprint arXiv:1605.00064, 2016.
[36]Saining Xie, et al., “Aggregated Residual Transformations for Deep Neural Networks.”, arXiv:1611.05431v2, 2017.
[37]Mo Chen, et al., “JPEG-phaseaware convolutional neural network for steganalysis of JPEG images.”, in Proc. 5th ACM Workshop Inf. Hiding Multimedia Secur., 2017.
[38]Tomas Denemark, et al., “Selection-channel-aware rich model for Steganalysis of digital images.”, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), 2014.
[39]Tomáš Denemark Denemark, et al., “Steganalysis Features for Content-Adaptive JPEG Steganography.”, IEEE Transactions on Information Forensics and Security, 2016.
[40]Diganta Misra, “Mish: A Self Regularized Non-Monotonic Neural Activation Function.”, arXiv:1908.08681, 2019.
[41] Patrick Bas, et al., “‘Break our steganographic system’: The ins and outs of organizing BOSS”, Proc. 13th Int. Conf. Inf. Hiding in Lecture Notes in Computer Science, vol. 6958, pp. 59–70., 2011
[42]Prajit Ramachandran, et al., “Searching for Activation Functions”, arXiv:1710.05941, 2017.
[43]Diederik P. Kingma and Jimmy Ba, “Adam: A method for stochastic optimization”, arXiv:1412.6980, 2014.
[44]Kaiming He, et al., “Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification”, Proceedings of the IEEE International Conference on Computer Vision (ICCV), 2015.
[45]Dan Hendryck and Kevin Gimpel, “GAUSSIAN ERROR LINEAR UNITS (GELUS)”, arXiv:1606.08415v4, 2020.
[46]P. Bas and T. Furon., “BOWS-2.”, http://bows2.ec-lille.fr, Jul. 2007.
[47]https://alaska.utt.fr/#timeline
[48]Rémi Cogranne, et al., “Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.”, ACM Information Hiding and MultiMedia Security, Jun. 2020.
[49]Linjie Guo, et al., “Using statistical image model for JPEG steganography: Uniform embedding revisited.”, IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2669–2680, 2015. |