[1] |
FRIDRICH J, KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3):868-882.
|
[2] |
TAN S Q, ZHANG H J, LI B, et al. Pixel-decimation-assisted steganalysis of synchronize-embedding-changes steganography[J]. IEEE Transactions on Information Forensics and Security, 2017,12(7):1658-1670.
|
[3] |
LU W, LI R P, ZENG L W, et al. Binary image steganalysis based on histogram of structuring elements[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(9):3081-3094.
|
[4] |
TAN S Q, LI B. Stacked convolutional auto-encoders for steganalysis of digital images[C]// Proceedings of the 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. 2014. DOI: 10.1109/APSIPA.2014.7041565.
|
[5] |
ZENG J S, TAN S Q, LIU G Q, et al. WISERNet: Wider separate-then-reunion network for steganalysis of color images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(10):2735-2748.
|
[6] |
LIU J R, LU W, ZHAN Y L, et al. Efficient binary image steganalysis based on ensemble neural network of multi-module[J]. Journal of Real-Time Image Processing, 2020,17(1):137-147.
|
[7] |
LIU N S, GUO D H. Robust digital watermarking based on chaotic maps[C]// Proceedings of the 2012 International Conference on Anti-counterfeiting, Security and Identification. 2012. DOI: 10.1109/ICASID.2012.6325280.
|
[8] |
PANDEY P, KUMAR S, SINGH S K. Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking[J]. Multimedia Tools and Applications, 2014,72(1):723-748.
|
[9] |
MISHRA A, AGARWAL C, SHARMA A, et al. Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm[J]. Expert Systems with Applications, 2014,41(17):7858-7867.
|
[10] |
CENTINEL G, CERKEZI L L. Chaotic digital image watermarking scheme based on DWT and SVD[C]// Proceedings of the 2015 9th International Conference on Electrical and Electronics Engineering. 2015:251-255.
|
[11] |
展虎,毛力. 基于NSCT-DCT-DWT-SVD联合数字水印算法[J]. 计算机应用与软件, 2018,35(3):309-315.
|
[12] |
张秀娟,朱春伟. 一种基于DWT-SVD的图像数字水印算法[J]. 数字技术与应用, 2017(10):104-107.
|
[13] |
BOROUMAND M, CHEN M, FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5):1181-1193.
|
[14] |
解晓康. 基于迁移学习的模糊图像识别技术研究[D]. 武汉:华中科技大学, 2016.
|
[15] |
张雪松,庄严,闫飞,等. 基于迁移学习的类别级物体识别与检测研究与进展[J]. 自动化学报, 2019,45(7):1224-1243.
|
[16] |
黄家才,舒奇,朱晓春,等. 基于迁移学习的机器人视觉识别与分拣策略[J]. 计算机工程与应用, 2019,55(8):232-237.
|
[17] |
庄福振,罗平,何清,等. 迁移学习研究进展[J]. 软件学报, 2015,26(1):26-39.
|
[18] |
宋光慧. 基于迁移学习与深度卷积特征的图像标注方法研究[D]. 杭州:浙江大学, 2016.
|
[19] |
WANG Y F, COTTRELL G W. Bikers are like tobacco shops, formal dressers are like suits: Recognizing urban tribes with caffe[C]// Proceedings of the 2015 IEEE Winter Conference on Applications of Computer Vision. 2015:876-883.
|
[20] |
HU H T, HSU L Y, CHOU H H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated[J]. Information Sciences, 2020,519:161-182.
|
[21] |
BAS P, FILLER T, PEVNY T. “Break our steganographic system”: The ins and outs of organizing BOSS[C]// Proceedings of the 2011 International Workshop on Information Hiding. 2011:59-70.
|
[22] |
AHMADI M, NOROUZI A, KARIMI N, et al. ReDMark: Framework for residual diffusion watermarking based on deep networks[J]. Expert Systems with Applications, 2020,146. DOI: 10.1016/j.eswa.2019.113157.
|
[23] |
BAS P, FURON T. BOWS-2[EB/OL]. (2007-07-30)[2022-02-07]. http://bows2.ec-lille.fr.
|
[24] |
薛胜男,陈秀宏. 基于混沌加密和SVD的数字图像水印算法[J]. 计算机工程, 2012,38(19):107-110.
|
[25] |
孙超. 基于DWT-SVD的数字图像盲水印算法研究[D]. 广州:华南理工大学, 2012.
|
[26] |
Alvin, WICAKSANA A, PRASETIYOWATI M I. Digital watermarking for color image using DHWT and LSB[C]// Proceedings of the 2019 5th International Conference on New Media Studies. 2019:94-99.
|
[27] |
李传鑫,刘增力. 时频分析与VGG19迁移学习的轴承故障检测[J]. 电子测量技术, 2021,44(5):161-165.
|
[28] |
SU Q T. Novel blind colour image watermarking technique using Hessenberg decomposition[J]. IET Image Processing, 2016,10(11):817-829.
|
[29] |
魏立线,高培贤,刘佳,等. 基于卷积神经网络的图像隐写分析方法[J]. 计算机应用研究, 2019,36(1):235-238.
|
[30] |
PIBRE L, JEROME P, IENCO D, et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch[J]. arXiv preprint arXiv:1511.04855, 2015.
|
[31] |
陈升. 基于深度学习的图像隐写分析研究[D]. 贵阳:贵州大学, 2021.
|
[32] |
YE J, NI J Q, YANG Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11):2545-2557.
|
[33] |
JIN Z J, LI H, YANG Y, et al. An image steganalysis model combined with the directionality of residuals[C]// Proceedings of the 2020 International Conference on Artificial Intelligence and Security. 2020:546-556.
|