论文信息:
L. Meng, F. Li, X. Jiang, and Q. Xu, "A Universal Framework for Improving the Robustness of Coverless Image Steganography Based on Image Restoration," in IEEE Transactions on Circuits and Systems for Video Technology, DOI: 10.1109/TCSVT.2024.3454457.
参考文献:
[18] Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, “Coverless image steganography without embedding,” in Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers 1. Springer, 2015, pp. 123–132.
[28] X. Zhang, F. Peng, and M. Long, “Robust coverless image steganography based on dct and lda topic classifification,” IEEE Transactions on Multimedia, vol. 20, no. 12, pp. 3223–3238, 2018.
[31] N. A. Karim, S. A. Ali, and M. J. Jawad, “A coverless image steganography based on robust image wavelet hashing,” TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 20, no. 6, 2022.
[32] L. Meng, X. Jiang, Z. Zhang, Z. Li, and T. Sun, “A robust coverless image steganography based on an end-to-end hash generation model,”IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, no. 7, pp. 3542–3558, 2023.
[36] L. Zou, J. Li, W. Wan, Q. M. J. Wu, and J. Sun, “Robust coverless image steganography based on neglected coverless image dataset construction,”IEEE Transactions on Multimedia, vol. 25, pp. 5552–5564, 2023.
供稿:孟来锦、蒋兴浩