Jiang et al., 2020 - Google Patents
A new steganography without embedding based on adversarial trainingJiang et al., 2020
- Document ID
- 14670186452754504471
- Author
- Jiang W
- Hu D
- Yu C
- Li M
- Zhao Z
- Publication year
- Publication venue
- Proceedings of the ACM Turing Celebration Conference-China
External Links
Snippet
Steganography is an art to hide information in the carriers to prevent from being detected, while steganalysis is the opposite art to detect the presence of the hidden information. With the development of deep learning, several state-of-the-art steganography and steganalysis …
- 238000011084 recovery 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qin et al. | Coverless image steganography: a survey | |
Hayes et al. | Generating steganographic images via adversarial training | |
Subramanian et al. | End-to-end image steganography using deep convolutional autoencoders | |
CN110084734B (en) | Big data ownership protection method based on object local generation countermeasure network | |
Jiang et al. | A new steganography without embedding based on adversarial training | |
Yu et al. | An improved steganography without embedding based on attention GAN | |
Zhang et al. | Generative reversible data hiding by image‐to‐image translation via GANs | |
Peng et al. | Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model | |
Lodeiro-Santiago et al. | Secure UAV‐based system to detect small boats using neural networks | |
Zeng et al. | Securing deep generative models with universal adversarial signature | |
Chen et al. | Enhancing steganography via stego post-processing by reducing image residual difference | |
Yin et al. | Ginver: Generative model inversion attacks against collaborative inference | |
CN116486493A (en) | Living body detection method, device and equipment | |
Zheng et al. | Steganographer detection based on multiclass dilated residual networks | |
Alkishri et al. | Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection | |
CN109413068B (en) | Wireless signal encryption method based on dual GAN | |
Cao et al. | Fast generative adversarial networks model for masked image restoration | |
Li et al. | Reversible data hiding for encrypted 3D model based on prediction error expansion | |
Wu et al. | Progressive selection‐channel networks for image steganalysis | |
Jonker et al. | Detecting post editing of multimedia images using transfer learning and fine tuning | |
Ito et al. | Access control of semantic segmentation models using encrypted feature maps | |
Luo et al. | Content-adaptive adversarial embedding for image steganography using deep reinforcement learning | |
Li et al. | Attack on deep steganalysis neural networks | |
Li et al. | Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? | |
Bharti et al. | Security enhancements for high quality image transaction with hybrid image steganography algorithm |