共 43 条
- [1] Feng DG, Zhang M, Li H., Big data security and privacy protection, Chinese Joural of Computers, 37, 1, pp. 246-258, (2014)
- [2] Xiang SJ, Luo XR., Reversible data hiding in encrypted image based on homomorphic public key cryptosystem, Ruan Jian Xue Bao/Journal of Software, 27, 6, pp. 1592-1601, (2016)
- [3] Zhai LM, Jia J, Ren WX, Et al., Progress in deep learning in the field of image steganography and steganalysis, Journal of Cyber Security, 3, 6, pp. 2-12, (2018)
- [4] Liu J, Ke Y, Lei Y., Recent advances of image steganography with generative adversarial networks, (2019)
- [5] Schmidhuber J., Deep learning in neural networks: An overview, Neural Networks, 61, pp. 85-117, (2015)
- [6] Tan S, Li B., Stacked convolutional auto-encoders for steganalysis of digitalimages, Proc. of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA), pp. 1-4, (2014)
- [7] Qian Y, Dong J, Wang W, Tan T., Deep learning for steganalysis via convolutional neural networks, Proc. of the Media Watermarking, Security, and Forensics 2015. Int’l Society for Optics and Photonics, 9409, (2015)
- [8] Xu G, Wu HZ, Shi YQ., Structural design of convolutional neural networks for steganalysis, IEEE Signal Processing Letters, 23, 5, pp. 708-712, (2016)
- [9] Qian Y, Dong J, Wang W., Learning and transferring representations for image steganalysis using convolutional neural network, Proc. of the 2016 IEEE Int’l Conf. on Image Processing (ICIP), pp. 2752-2756, (2016)
- [10] Wallace GK., The JPEG still picture compression standard, IEEE Trans. on Consumer Electronics, 38, 1, pp. xviii-xxxiv, (1992)