[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jiang et al., 2020 - Google Patents

A new steganography without embedding based on adversarial training

Jiang et al., 2020

Document ID
14670186452754504471
Author
Jiang W
Hu D
Yu C
Li M
Zhao Z
Publication year
Publication venue
Proceedings of the ACM Turing Celebration Conference-China

External Links

Snippet

Steganography is an art to hide information in the carriers to prevent from being detected, while steganalysis is the opposite art to detect the presence of the hidden information. With the development of deep learning, several state-of-the-art steganography and steganalysis …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Qin et al. Coverless image steganography: a survey
Hayes et al. Generating steganographic images via adversarial training
Subramanian et al. End-to-end image steganography using deep convolutional autoencoders
CN110084734B (en) Big data ownership protection method based on object local generation countermeasure network
Jiang et al. A new steganography without embedding based on adversarial training
Yu et al. An improved steganography without embedding based on attention GAN
Zhang et al. Generative reversible data hiding by image‐to‐image translation via GANs
Peng et al. Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model
Lodeiro-Santiago et al. Secure UAV‐based system to detect small boats using neural networks
Zeng et al. Securing deep generative models with universal adversarial signature
Chen et al. Enhancing steganography via stego post-processing by reducing image residual difference
Yin et al. Ginver: Generative model inversion attacks against collaborative inference
CN116486493A (en) Living body detection method, device and equipment
Zheng et al. Steganographer detection based on multiclass dilated residual networks
Alkishri et al. Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection
CN109413068B (en) Wireless signal encryption method based on dual GAN
Cao et al. Fast generative adversarial networks model for masked image restoration
Li et al. Reversible data hiding for encrypted 3D model based on prediction error expansion
Wu et al. Progressive selection‐channel networks for image steganalysis
Jonker et al. Detecting post editing of multimedia images using transfer learning and fine tuning
Ito et al. Access control of semantic segmentation models using encrypted feature maps
Luo et al. Content-adaptive adversarial embedding for image steganography using deep reinforcement learning
Li et al. Attack on deep steganalysis neural networks
Li et al. Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes?
Bharti et al. Security enhancements for high quality image transaction with hybrid image steganography algorithm