[1] Fridrich J. Steganography in digital media:principles, algorithms, and applications[M]. New York:Cambridge University Press, 2009. [2] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):201-214. [3] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935. [4] Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks[J]. The International Society for Optical Engineering, 2015, 9409:94090J-94090J-10. [5] 阮书涵,秦正才. 一种基于GIF图像的无载体隐蔽通信方法[J]. 通信技术, 2017, 50(7):1506-1510. Ran S H, Qin Z C. Coverless covert communication based on GIF Ⅱmage[J]. Communications Technology, 2017, 50(7):1506-1510. (in Chinese) [6] 周志立,曹燚,孙星明. 基于图像Bag-of-Words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on Bag-of-Words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536.(in Chinese) [7] Ke Y, Zhang M, Liu J, et al. Generative steganography with Kerckhoffs' principle based on generative adversarial networks[DB/OL]. 2017[2017-11-25]. arXiv:1711.04916. [8] Liu J, Zhou T, Zhang Z, et al. Digital gardan grille:a modern approach for information hiding[DB/OL]. 2018[2018-03-21]. arXiv:1803.09219. [9] Liu J, Ke Y, Lei Y, et al. Generative steganography by sampling[J]. IEEE Access, 2019, 7:118586-118597. [10] Liu M M, Zhang M Q, Liu J, et al. Coverless information hiding based on generative adversarial networks[DB/OL]. 2017[2017-12-29]. arXiv:1712.06951. [11] Hu D H, Wang L, Jing W J, et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018:1-12. [12] Yi Z, Zhang H, Tan P, et al. DualGAN:unsupervised dual learning for image-to-image translation[DB/OL]. 2017[2017-05-25]. arXiv:1704.02510. [13] Zhu J Y, Park T, Isola P, et al. Unpaired image-to-image translation using cycle-consistent adversarial networks[C]//IEEE International Conference on Computer Vision, 2017:2242-2251. [14] Kim T, Cha M, Kim H, et al. Learning to discover cross-domain relations with generative adversarial networks[J]. 한국지능정보시스템학회 학술대회논문집, 2017, 50(7):1506-1510 [15] Johnson J, Alahi A, Li F F. Perceptual losses for real-time style transfer and super-resolution[DB/OL]. 2016[2016-10-16]. arXiv:1603.08155. [16] Luan F J, Paris S, Shechtman E, et al. Deep photo style transfer[C]//IEEE Conference on Computer Vision and Pattern Recognition, 2017:6997-7005. [17] Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014, 2:2672-2680. [18] Zhou Z, Sun H, Harit R, et al. Coverless image steganography without embedding[C]//International Conference on Cloud Computing and Security. Springer, 2015, 9483:123-132. [19] Zheng S L, Wang L, Ling B H, et al. Coverless information hiding based on robust image hashing[C]//Intelligent Computing Methodologies:13th International Conference, 2017:536-547. [20] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81. [21] Xu J, Mao X, Jin X, et al. Hidden message in a deformation-based texture[J]. The Visual Computer, 2015, 31(12):1653-1669. [22] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2014, 24(1):130-139. [23] Ke Y, Liu J, Zhang M Q, et al. Steganography security:principle and practice[J]. IEEE Access, 2018(6):73009-73022. |