|
[1]W. Bender, D. Gruhl, N. Morimoto, and A. Lu.(1996)Techniques for data hiding, IBM syst. J., vol. 35, nos. 3 – 4, pp. 313 – 336. [2]Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, and Ahmed Bouridane.(2021) Image Steganography: A Review of the Recent Advances. IEEE Digital Object Identifier 10.1109 [3]Shumeet Baluja.(2017)Hiding Images in Plain Sight: Deep Steganography. 31st Conference on Neural Information Processing Systems [4]D. Hu, L. Wang, W. Jiang, S. Zheng and B. Li, "A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks," in IEEE Access, vol. 6, pp. 38303-38314, 2018. [5]Kweon, H., Park, J., Woo, S., & Cho, D. (2021). Deep multi-image steganography with private keys. Electronics, 10(16), 1906. [6]P.J.Liu, H.Z.Zhang, K.Zhang, L.Lin, and Wang M.Z.Wang.(2019) .Multi-level Wavelet-CNN for Image Restoration [7]Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding-A survey. Proceedings of the IEEE, 87(7), 1062–1078. [8]Trithemius, J. (1606). Steganographia, hoc est, Ars per occvltam scriptvram animi svi volvntatem absentibvs aperiendi certa ...: Præfixa Est Hvic operi Sva clavis, Sev Vera Introductio ab ipso Authore Concinnata: Hactenvs qvidem a mvltis Mvltvm Desiderata, Sed À paucissimis visa: Nunc vero in Gratiam secretioris Philosophiæ studiosorum publici iuris facta. Ex officina typographica Matthiæ Beckeri, sumptibus Ioannis Berneri. [9]Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding-A survey. Proceedings of the IEEE, 87(7), 1062–1078. [10]Hussain, M., Wahab, A. W., Idris, Y. I., Ho, A. T. S., & Jung, K.-H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. [11]Banoci, V., Bugar, G., & Levicky, D. (2011). A novel method of image steganography in DWT domain. Proceedings of 21st International Conference Radioelektronika 2011. [12]V, S. (2020). An empirical science research on bioinformatics in Machine Learning. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, spl7(1). [13]Michelucci, U. (2022). Autoencoders. Applied Deep Learning with TensorFlow 2, 257–283. [14]Ronneberger, O. (2017). Invited talk: U-net convolutional networks for biomedical image segmentation. Informatik Aktuell, 3–3. [15]Duan, X., Jia, K., Li, B., Guo, D., Zhang, E., & Qin, C. (2019). Reversible image steganography scheme based on a U-Net Structure. IEEE Access, 7, 9314–9323. [16]Mallat, S. G. (1989). A theory for multiresolution signal decomposition: The wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 11(7), 674–693. [17]Lecun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278–2324. [18]Wani, M. A., & Sultan, B. (2022). Deep Learning Based Image Steganography: A Review. WIREs Data Mining and Knowledge Discovery. [19]Baluja, S. (2017). Hiding images in plain sight: Deep steganography. Advances in neural information processing systems, 30. [20]Volkhonskiy, D., Nazarov, I., &; Burnaev, E. (2020). Steganographic generative Adversarial Networks. Twelfth International Conference on Machine Vision (ICMV 2019). [21]Shi, H., Dong, J., Wang, W., Qian, Y., & Zhang, X. (2018). SSGAN: Secure steganography based on generative Adversarial Networks. Advances in Multimedia Information Processing – PCM 2017, 534–544. [22]Duan, X., Li, B., Guo, D., Zhang, Z., & Ma, Y. (2020). A coverless steganography method based on generative Adversarial Network. EURASIP Journal on Image and Video Processing, 2020(1). [23]Van, T. P., Dinh, T. H., & Thanh, T. M. (2019). Simultaneous convolutional neural network for highly efficient image steganography. 2019 19th International Symposium on Communications and Information Technologies (ISCIT). [24]ur Rehman, A., Rahim, R., Nadeem, S., & ul Hussain, S. (2019). End-to-end trained CNN encoder-decoder networks for image steganography. Lecture Notes in Computer Science, 723–729. [25]Strikingly. (n.d.). 什麼是推薦行銷? - 建立你的網站. Strikingly. Retrieved March 9, 2023, from https://tw.strikingly.com/content/blog/referral-marketing/ [26]Referral marketing: What is it and why does it matter? (n.d.). Retrieved March 13, 2023, from https://www.business2community.com/marketing/referral-marketing-matter-0944226 [27]Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A. C., & Fei-Fei, L. (2015). Imagenet Large Scale Visual Recognition Challenge. International Journal of Computer Vision, 115(3), 211–252. [28]Demir, I., Koperski, K., Lindenbaum, D., Pang, G., Huang, J., Basu, S., Hughes, F., Tuia, D., & Raskar, R. (2018). DeepGlobe 2018: A Challenge to parse the Earth through satellite images. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). [29]Das, A., Wahi, J. S., Anand, M., & Rana, Y. (2021). Multi-Image Steganography Using Deep Neural Networks. ArXiv Computer Vision and Pattern Recognition [30]ur Rehman, A., Rahim, R., Nadeem, S., & ul;Hussain, S. (2019). End-to-end trained CNN encoder-decoder networks for image steganography. Lecture Notes in Computer Science, 723–729. [31]Duan, X., Liu, N., Gou, M., Wang, W., & Qin, C. (2020). STEGANOCNN: Image steganography with generalization ability based on convolutional neural network. Entropy, 22(10), 1140. [32]Zhu, J., Kaplan, R., Johnson, J., & Fei-Fei, L. (2018). Hidden: Hiding data with Deep Networks. Computer Vision – ECCV 2018, 682–697. [33]Fu, Z., Wang, F., & Cheng, X. (2020). The secure steganography for hiding images via gan. EURASIP Journal on Image and Video Processing, 2020(1).
|