The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2020
DOI: 10.1016/j.jvcir.2020.102910
|View full text |Cite
|
Sign up to set email alerts
|

Steganography using a 3-player game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…After the development of GANs, a research spurring paper appeared in late 2016, featuring two neural networks learning a symmetric key encryption system in the presence of an adversary [13]. Several follow up works performed a study on the security [18], ported it to steganography [20], [21] or improved its security [19]. More details and a security analysis are summarized in Table 1 and explained in Section IV.…”
Section: Neural Network Based Cryptographymentioning
confidence: 99%
See 4 more Smart Citations
“…After the development of GANs, a research spurring paper appeared in late 2016, featuring two neural networks learning a symmetric key encryption system in the presence of an adversary [13]. Several follow up works performed a study on the security [18], ported it to steganography [20], [21] or improved its security [19]. More details and a security analysis are summarized in Table 1 and explained in Section IV.…”
Section: Neural Network Based Cryptographymentioning
confidence: 99%
“…Besides encryption, different researchers in two recent papers [20], [21] pushed the idea of the model proposed by Abadi et al [13] in order to build a steganography model based on neural networks.…”
Section: G Steganographymentioning
confidence: 99%
See 3 more Smart Citations