Adversarial batch image steganography against CNN-based pooled steganalysis
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Adversarial batch image steganography against CNN-based pooled steganalysis
Authors
Keywords
Batch steganography, Adversarial attack, Pooled steganalysis, Deep learning
Journal
SIGNAL PROCESSING
Volume 181, Issue -, Pages 107920
Publisher
Elsevier BV
Online
2020-12-06
DOI
10.1016/j.sigpro.2020.107920
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- CNN-Based Adversarial Embedding for Image Steganography
- (2019) Weixuan Tang et al. IEEE Transactions on Information Forensics and Security
- Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
- (2019) Xinzhi Yu et al. SIGNAL PROCESSING
- Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition
- (2018) Fengyong Li et al. IEEE Access
- Deep Residual Network for Steganalysis of Digital Images
- (2018) Mehdi Boroumand et al. IEEE Transactions on Information Forensics and Security
- Deep Learning Hierarchical Representations for Image Steganalysis
- (2017) Jian Ye et al. IEEE Transactions on Information Forensics and Security
- Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain
- (2017) Zengzhen Zhao et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Efficient steganographer detection over social networks with sampling reconstruction
- (2017) Fengyong Li et al. Peer-to-Peer Networking and Applications
- Structural Design of Convolutional Neural Networks for Steganalysis
- (2016) Guanshuo Xu et al. IEEE SIGNAL PROCESSING LETTERS
- Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles
- (2016) Fengyong Li et al. IEEE Transactions on Information Forensics and Security
- Content-Adaptive Steganography by Minimizing Statistical Detectability
- (2016) Vahid Sedighi et al. IEEE Transactions on Information Forensics and Security
- A Strategy of Clustering Modification Directions in Spatial Image Steganography
- (2015) Bin Li et al. IEEE Transactions on Information Forensics and Security
- The Steganographer is the Outlier: Realistic Large-Scale Steganalysis
- (2014) Andrew D. Ker et al. IEEE Transactions on Information Forensics and Security
- Rich Models for Steganalysis of Digital Images
- (2012) Jessica Fridrich et al. IEEE Transactions on Information Forensics and Security
- Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
- (2011) T. Filler et al. IEEE Transactions on Information Forensics and Security
- Ensemble Classifiers for Steganalysis of Digital Media
- (2011) Jan Kodovsky et al. IEEE Transactions on Information Forensics and Security
- Steganalysis by Subtractive Pixel Adjacency Matrix
- (2010) Tomáš Pevny et al. IEEE Transactions on Information Forensics and Security
- Gibbs Construction in Steganography
- (2010) Tom Filler et al. IEEE Transactions on Information Forensics and Security
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now