|
[1]Nagham Hamid, Abid Yahya, R.Badlishah Ahmad, and Osamah M. AI-Qershi. “Image Steganography Techniques: An Overview”, International Journal of Computer Science and Security, vol. 6, pp. 168-183, 2012. [2]Abdul Gabbar Tarish Al Tamimi, Abdulmalek Abdulijabbar Alqobaty. “Image Steganography using Least Significant Bits (LSBs): A Novel Alogorothm”. International Journal of Computer Scicence and Information Security, vol. 13, pp. 1-5, 2015. [3]Savita Goal, Shilpi Gupta, and Nisha Kaushik. “Image Steganography – Least Significant Bit with Multiple Progressions”, Advances Intelligent Systems and Computing, vol. 328, 2014. [4]Amitha Mathew, P.Amudha, and S.Sivakumari. “Deep Learning Techniques: An Overview”, Advanced Machine Learning Technologies and Applications, pp. 1-9, 2021. [5]S. Baluja, ‘‘Hiding images in plain sight: Deep steganography,’’ in Proc. NIPS, pp. 2069–2079, 2017. [6]Yann Lecun, Leon Bottou, Yoshua Bengio, and Patrick Haffner. “Gradient -Based Learning Applied to Document Recognition”, PROC.OF THE IEEE, vol. 86, pp. 2278-2324, Nov 1998. [7]Keiron O’shea and Ryan Nash. “An Introduction to Convolutional Neural Networks”, arXiv:1511.08458v2 [cs.NE], Dec 2015. [8]Mehmed Kantardzic and et al. “Deep learning based image steganography: A review.” IEEE Access, 2022. [9]Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Parallel distributed processing: Explorations in the microstructure of cognition. chap. Learning Internal Representations by Error Propagation. MIT Press, Cambridge, MA, USA. URL http://dl.acm. org/citation.cfm?id=104279.104293, vol. 1, pp. 318-362, 1986. [10]Sedhain, S., Menon, A.K., Sanner, S., Xie, L.: Autorec: “Autoencoders meet collaborative filtering”, In: Proceedings of the 24th International Conference on World Wide Web Companion, WWW Florence, Italy, Companion, pp. 111–112, May 2015. [11]Song, C., Liu, F., Huang, Y., Wang, L., Tan, T. “Auto-encoder based data clustering”, In: J. Ruiz-Shulcloper, G. Sanniti di Baja (eds.), Progress in Pattern Recognition, Image Analaysis, Computer Vision, and Applications, pp. 117–124, 2013. [12]Dor Bank, Noam Koenigstein, and Raja Giryes, “Autoencoders.” arXiv:2003.5991v2 [cs.LG], Apr 2021. [13]Bin Zhang, Yang Xin, Xinxin Niu, and kaiguo Yuan. “A Near Reversible Image Watermarking Algorithm.” Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, July 2010. [14]Olaf Ronneberger, Philipp Fischer, and Thomas Brox. “U-Net: Convolutional Networks for Biomedical Image Segmentation”, Computer Vision and Pattern Recognition, May 2015. [15]Alain Hore, and Djemel Ziou. “Image Quality Metrics: PSNR vs. SSIM.” International Conference on Pattern Recognition, 2010. [16]Nahdhini Subramanian, Ismahane Cheheb, Omar Elharrouss, Somaya Al-Maadeed, and Ahmed Bouridane. “End-to-End Image Steganography using Deep Convolutional Autoencoders”, IEEE Access, vol. 9, pp. 135585-135593, Oct 2021. [17]Tran Thi Ngoc Tin, Yih-Chuan Lin, “Patch-based Image Steganography using Deep Convolutonal Neural Networks”, Proceedings of ISBN, 2023. [18]Xintao Duan, Kai Jia, Baoxia Li, Daidou Guo, En Zhang, and Chuan Qin. “Reversible Image Steganography Scheme Based on a U-NET Structure.” IEEE Access, vol. 7, pp. 9314-9323, 2019. [19]Dinh, L.; Krueger, D.; Bengio, Y. Nice. “Non-linear independent components estimation.” In Proceedings of the International Conference on Learning Representations (ICLR), Banff, AB, Canada, April 2014. [20]Dinh, L.; Sohl-Dickstein, J.; Bengio, S. “Density Estimation Using Real NVP”, In Proceedings of the International Conference on Learning Representations (ICLR), San Juan, Puerto Rico, May 2016. [21]Kingma, D.P.; Dhariwal, P. Glow. “Generative flow with invertible 1 × 1 convolutions”, In Advances in Neural Information Processing Systems; Bengio, S., Wallach, H., Eds.; Curran Associates, Inc.: Red Hook, NY, USA, 2018. [22]Xu, Y.; Mou, C.; Hu, Y.; Xie, J.; Zhang, J. “Robust Invertible Image Steganography”, In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), New Orleans, LA, USA, June 2022. [23]Jing, J.; Deng, X.; Xu, M.; Wang, J.; Guan, Z. “HiNet: Deep Image Hiding by Invertible Network”, In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada, 10–17 October 2021. [24]Lu, S.P.; Wang, R.; Zhong, T.; Rosin, P.L. “Large-Capacity Image Steganography Based on Invertible Neural Networks”, In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 20–25 June 2021. [25]Yih-Chuan Lin, Tzung-Shian Li. “Lossless Data Hiding for JPEG Picture”, Journal of Imaging Science and Technology., pp. 050502-1- 050502-14, 2011. [26]Yih-Chuan Lin. “Reversible data hiding for progressive image transmission.” Signal Processing: Image Communication, pp. 628-645, 2011. [27]Atique ur Rehman, Rafia Rahim, Shahroz Nadeem, and Sibt ul Hussain. “End-to-End Trained CNN Encoder-Decoder Networks for Image Steganography”, arXiv:1711.07201v1 [cs.MM], Nov 2017. [28]Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, and Neghai Yu. “Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.” arXiv:2104.04268v1 [cs.CR], Apr 2021. [29]T.-S. Nguyen, C.-C. Chang, and T.-H. Shih, ‘‘Effective reversible image steganography based on rhombus prediction and local complexity,’’ Multimedia Tools, Appl., vol. 77, no. 14, pp. 26449–26467, 2018. [30]O. Ronneberger, P. Fischer, and T. Brox, ‘‘U-net: Convolutional networks for biomedical image segmentation,’’ in Proc. 18th Int. Conf. Med. Image Comput. Comput.-Assist. Intervent., vol. 9351, pp. 234–241, 2015. [31]K. C. Wu and C. M. Wang, ‘‘Steganography using reversible texture synthesis,’’ IEEE Trans. Image Process., vol. 24, no. 1, pp. 130–139, Jan. 2015. [32]V. Holub and J. Fridrich, ‘‘Designing steganographic distortion using directional filters’’, in Proc. IEEE Int. Workshop Inf. Forensics Secur., pp. 234–239, Dec 2013. [33]Lynton Ardizzone, Jakob Kruse, Sebastian Wirkert, Daniel Rahner, Eric W.Pellegrini, Ralf S.Klessen, Lena Maier-Hein, Carsten Rother, Ullrich Kothe. “Analyzing Inverse Problems with Invertible Neural Networks.” arX1v:1080.04730v3 [cs.LG], Feb 2019. [34]Youmin Xu, Chong Mou, Yujie Hu, Jingfen Xie, and Jian Zhang. “Robust Invertible Image Steganography.” Computer Vision Foundation, pp. 7875-7882, 2022. [35]D.P.Gaikwad and S.J.Wagh. “Colour Image Restoration For An Effective Steganography”, Imanager’s Journal on Software Engineering, Vol.4 .No.3, pp.65-71, 2010.
|