[1] 沈昌祥,张焕国,冯登国. 信息安全综述[J]. 中国科学,2007, 37(2):129-150. Shen C X, Zhang H G, Feng D G. A survey of information security[J]. Science China, 2007, 37(2):129-150. (in Chinese)
[2] Tirkel A Z, Rankin G A, Schyndel R V. Electronic watermark[C]//Digital Image Computing, Technology and Applications, 1993.
[3] Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics & Security, 2008, 3(3):488-497.
[4] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1.
[5] Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[J]. Lecture Notes in Computer Science, 2010, 6387:161-177.
[6] Holub V, Fridrich J. Designing steganographic distortion using directional flters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2013:234-239.
[7] Ruanaidh J K, Dowling W J, Boland F M. Phase watermarking of digital images[C]//International Conference on Image Processing, 1996:239-242.
[8] Cox I J, Kilian J, Leighton F T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687.
[9] Lin W H, Horng S J, Kao T W. An efcient watermarking method based on signifcant difference of wavelet coefcient quantiZation[J]. IEEE Transactions on Multimedia, 2008, 10(5):746-757.
[10] 周志立,曹燚,孙星明. 基于图像bag-of-words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536. (in Chinese)
[11] 张新鹏,钱振兴,李晟. 信息隐藏研究展望[J]. 应用科学学报,2016, 34(5):475-489. Zhang X P, Qian Z X, Li S. Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016, 34(5):475-489. (in Chinese)
[12] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81.
[13] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions Image Processing, 2015, 24(1):130-139.
[14] Goodfellow I, Pouget A J, Mirz M, Xu B, Wardef D, Ozair S, Courville A, Bengio Y. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014:2672-2680.
[15] Odena A, Olah C, Shlens J. Conditional image synthesis with auxiliary classifer GANs[J]. Computer Science, 2016.
[16] 王坤峰,苟超,段艳杰,林懿伦,郑心湖,王飞跃. 生成式对抗网络GAN的研究进展与展望[J]. 自动化学报,2017, 43(3):321-332. Wang K F, Gou C, Duan Y J, Lin Y L, Zheng X H, Wang F Y. Generative adversarial networks:the state of the art and beyond[J]. Acta Automatica Sinica, 2017, 43(3):321-332. (in Chinese)
[17] Radford A, Metz L, Chintala S. Unsupervised representation learning with deep convolutional generative adversarial networks[J]. Computer Science, 2015.
[18] Mirz M, Osindero S. Conditional generative adversarial nets[J]. Computer Science, 2014:2672-2680.
[19] Chen X, Duan Y, Houthooft R, Schulmanj, Sutskeveri, Abbeel P. InfoGAN:interpretable representation learning by information maximizing generative adversarial nets[J]. Computer Science, 2016.
[20] Pibre L, Pasquet J, Ienco D, Chaumont M. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch[J]. Electronic Imaging, 2016, 4(8):1-11. |