2021
DOI: 10.1109/tcsvt.2020.2974884
|View full text |Cite
|
Sign up to set email alerts
|

Batch Steganography via Generative Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…To enhance steganographic security, Tang et al [41] present a steganographic scheme with adversarial embedding operation. Further, Zhong et al [42] propose a novel strategy of batch steganography exploiting a generative network. Through this method, different payloads can be allocated to different images.…”
Section: Steganographymentioning
confidence: 99%
“…To enhance steganographic security, Tang et al [41] present a steganographic scheme with adversarial embedding operation. Further, Zhong et al [42] propose a novel strategy of batch steganography exploiting a generative network. Through this method, different payloads can be allocated to different images.…”
Section: Steganographymentioning
confidence: 99%
“…Image steganography Inspired by the point of Goodfellow et al that "adversarial examples can be thought of as a sort of accidental steganography" [5], we treat adversarial perturbations as special steganographic modifications from the view of steganography [11]. These special steganographic modifications are added in original images to fool classifiers and avoid detections.…”
Section: Related Workmentioning
confidence: 99%
“…C&W minimizes the adversarial loss and the distance loss simultaneously to achieve the attack and keep the visual quality. We add the microscopical regularization to the object loss function of C&W attack as (11).…”
Section: Combination With Candwmentioning
confidence: 99%
“…For the receiver, secret message can be extracted by detecting the encoded points in the constructed fingerprint. In [44], batch steganography using a generative network is proposed to information in multiple images. In order to counter steganalysis by trying to fool the machine learning classifiers, researchers in [45] proposed an adversarial embedding technique to generate adversarial stego images with minimum amount of adjustable elements.…”
Section: Fig 2 General Model Of Information Extraction and Original Media Recoverymentioning
confidence: 99%
“…Recently, some researchers have applied neural networks to steganography [35][36][37][38][39][40][41][42][43][44][45]. As a cooperative algorithm, convolutional neural network with deep supervision edge detector retains more edge pixels over conventional edge detection, so it can increase data hiding capacity [35].…”
Section: Fig 1 a Simple Model Of Information Hidingmentioning
confidence: 99%