Wei et al., 2022 - Google Patents
Generative steganography networkWei et al., 2022
View PDF- Document ID
- 13644130395909156913
- Author
- Wei P
- Li S
- Zhang X
- Luo G
- Qian Z
- Zhou Q
- Publication year
- Publication venue
- Proceedings of the 30th ACM International Conference on Multimedia
External Links
Snippet
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly without …
- 238000001514 detection method 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding, e.g. from bit-mapped to non bit-mapped
- G06T9/001—Model-based coding, e.g. wire frame
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding, e.g. from bit-mapped to non bit-mapped
- G06T9/008—Vector quantisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wei et al. | Generative steganography network | |
Jia et al. | Mbrs: Enhancing robustness of dnn-based watermarking by mini-batch of real and simulated jpeg compression | |
CN110084734B (en) | Big data ownership protection method based on object local generation countermeasure network | |
Ubhi et al. | Neural style transfer for image within images and conditional GANs for destylization | |
Wani et al. | Deep learning based image steganography: A review | |
Wang et al. | HidingGAN: High capacity information hiding with generative adversarial network | |
Li et al. | Steganography of steganographic networks | |
Liao et al. | GIFMarking: The robust watermarking for animated GIF based deep learning | |
Bi et al. | High‐Capacity Image Steganography Algorithm Based on Image Style Transfer | |
Jiang et al. | A new steganography without embedding based on adversarial training | |
You et al. | Image generation network for covert transmission in online social network | |
Shi et al. | Hiding message using a cycle generative adversarial network | |
Song et al. | A survey on Deep-Learning-based image steganography | |
Wu et al. | Hiding data hiding | |
CN114157773B (en) | Image steganography method based on convolutional neural network and frequency domain attention | |
Luo et al. | Reversible adversarial steganography for security enhancement | |
Chen et al. | Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack | |
Duan et al. | DHU-Net: High-capacity binary data hiding network based on improved U-Net | |
Wang | An efficient multiple-bit reversible data hiding scheme without shifting | |
Ramandi et al. | VidaGAN: Adaptive GAN for image steganography | |
Wu et al. | Reversible and colorable deep image steganography with large capacity | |
Hashemi et al. | Color Image steganography using Deep convolutional Autoencoders based on ResNet architecture | |
Jiajia et al. | Minimum structural similarity distortion for reversible data hiding | |
Li et al. | Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders | |
Huang et al. | Visual cryptography for compressed sensing of images with transmission over multiple channels |