共 27 条
- [11] GOODFELLOW I, POUGET-ABADIE J, MIRZA M, Et al., Generative adversarial networks, Communications of the ACM, 63, 11, pp. 139-144, (2020)
- [12] FRIDRICH J, GOLJAN M, LISONEK P, Et al., Writing on wet paper, IEEE Transactions on Signal Processing, 53, 10, pp. 3923-3935, (2005)
- [13] PEVNY T, FILLER T, BAS P., Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, pp. 161-177, (2010)
- [14] HOLUB V, FRIDRICH J., Digital image steganography using universal distortion, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59-68, (2013)
- [15] FILLER T, JUDAS J, FRIDRICH J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
- [16] ZHANG Z K, PANG W G, XIE W J, Et al., Deep learning for real-time applications: a survey, Journal of Software, 31, 9, pp. 2654-2677, (2020)
- [17] LIU Y, LI J, ZHANG J L, Et al., Research progress of two-dimensional human pose estimation based on deep learning, Computer Engineering, 47, 3, pp. 1-16, (2021)
- [18] XIE X J, GU B., Research on antimicrobial resistance analysis based on deep learning, Journal of Hunan University (Natural Sciences), 48, 10, pp. 113-120, (2021)
- [19] HAYES J, DANEZIS G., Generating steganographic images via adversarial training, Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 1951-1960, (2017)
- [20] ZHU J R, KAPLAN R, JOHNSON J, Et al., HiDDeN: hiding data with deep networks, Computer Vision-ECCV 2018, pp. 682-697, (2018)