References
- H. Wang and S. Wang, "Cyber Warfare: Steganography vs. Steganalysis," Communication of ACM, 47(10), pp. 76-82, 2004. https://doi.org/10.1145/1022594.1022597
- J. Fridrich and M. Goljan, "Practical Steganalysis of Digital Images - State of the Art," Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 4675, pp. 1-13, 2002.
- J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," IEEE Transactions on Signal Processing, vol.53, no.10, pp.3923-3935, 2005. https://doi.org/10.1109/TSP.2005.855393
- A.Westfeld, "F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis," in Proc. of The Second International Workshop on Digital-forensics and Watermarking, Seoul, Korea, October, pp.154-167, 2003.
- W. Zhang, X. Zhang, and S. Wang, "Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes," in Proc. of 10th International Workshop on Information Hiding, Santa Barbara, CA, USA, May, pp.60-71, 2008.
- T. Filler, J. Judas, and J. Fridrich, "Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes," IEEE Transactions on Information Forensics and Security, Vol.6, no.3, pp.920-935, 2011. https://doi.org/10.1109/TIFS.2011.2134094
- H. Otori and S. Kuriyama, "Data-embeddable texture synthesis," in Proc. of the 8th International Symposium on Smart Graphics, Kyoto, Japan, pp. 146-157, 2007.
- H. Otori and S. Kuriyama, "Texture synthesis for mobile data communications," IEEE Comput. Graph, Appl., vol. 29, no. 6, pp. 74-81, 2009. https://doi.org/10.1109/MCG.2009.127
- K. Wu and C. Wang, "Steganography using reversible texture synthesis," IEEE Trans. Image Process, vol. 24, no. 1, pp. 130-139, Jan. 2015. https://doi.org/10.1109/TIP.2014.2371246
- H. Zhou, K. Chen, W. Zhang, and N. Yu, "Comments on "Steganography Using Reversible Texture Synthesis," IEEE Trans. Image Process, vol. 26, no. 4, 2017.
- Z. Qian, H. Zhou, W. Zhang, and X. Zhang, "Robust steganography using texture synthesis," in Proc. of Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2016, 25-33, Kaohsiung, Taiwan, Nov. 21-23, 2016.
- C. Santoni, F. Pellacini, "gTangle: a Grammar for the Procedural Generation of Tangle Patterns," in Proc. of ACM Transactions on Graphics (TOG) - Proceedings of ACM SIGGRAPH Asia 2016, Volume 35 Issue 6, 2016.
- Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security, Springer, pp. 123-132, August, 2015.
- J. Hayes, G. Danezis, "ste-GAN-ography: Generating Steganographic Images via Adversarial Training," 2017.
Cited by
- Coverless information hiding based on the generation of anime characters vol.2020, pp.None, 2020, https://doi.org/10.1186/s13640-020-00524-4