Author:
Ke Yan,Zhang Min-qing,Liu Jia,Su Ting-ting,Yang Xiao-yuan
Funder
National Natural Science Foundation of China
National Key R&D Program of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference19 articles.
1. Abadi M et al (2016) Learning to protect communications with adversarial neural cryptography. arXiv: 1610.06918v1
2. Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Transactions on Information Forensics and Security 3(1):1–15
3. Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process 53(10):3976–3987
4. Chang C-C, Nguyen T-S, Chien T-Y (2017) An efficient steganography scheme based on edge detection for high payload. Journal of Information Hiding and Multimedia Signal Processing 8(5):967–979
5. Chen X et al (2016) InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets. arXiv: 1606.03657
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献