Citation: Liyun Liu, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Guorui Feng. Steganography in beautified images[J]. Mathematical Biosciences and Engineering, 2019, 16(4): 2322-2333. doi: 10.3934/mbe.2019116
[1] | B. Li, S. Tan and M. Wang, et al., Investigation on cost assignment in spatial image steganography, IEEE. TIFS., 9 (2014), 1264–1277. |
[2] | Y. Ma, X. Luo and X. Li, et al., Selection of rich model steganalysis features based on decision rough set α-Positive region reduction, IEEE. TCSVT., (2018), In press. |
[3] | Y. Zhang, C. Qin and W. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, J. Sigpro., 146 (2018), 99–111. |
[4] | S. Li and X. Zhang, Towards construction based data hiding: from secrets to fingerprint images, IEEE. TIP., 28 (2019), 1482–1497. |
[5] | J.Frdrich and D. Soukal, Matrix embedding for large payloads, IEEE. TIFS., 1(2006), 390–395. |
[6] | X. Zhang and S. Wang, Efficient steganographic embedding by exploiting modification direction, IEEE. LCOMM., 10 (2016), 781–783. |
[7] | W. Zhang, X. Zhang and S. Wang, Maximizing steganographic embedding efficiency by combining hamming codes and wet paper codes, Proc. IH2008, Santa Barbara, CA, USA, (2008), 60–71. |
[8] | T. Filler, J.Judas and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE. TIFS., 6 (2011), 920–935. |
[9] | X. Luo, X. Song and X. Li, et al., Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes, MTAP., 75 (2016), 13557–13583. |
[10] | T. Pevný, T. Filler and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, Proc. IH2008, Calgary, Canada, (2010), 161–177. |
[11] | V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, Proc. IEEE. WIFS., Binghamton, NY, USA, (2012), 234–239. |
[12] | B Li, M. Wang, and J. Huang, et al., A new cost function for spatial image steganography, Proc. IEEE. ICIP., Paris, France, (2014), 4206–4210. |
[13] | V. Sedighi, J. Fridrich and R. Cogranne, Content-adaptive pentary steganography using the multivariate generalized gaussian cover model, Proc. SOP., San Francisco, California, USA, (2015), 94090H–94090H–13. |
[14] | V. Holub and J. Fridrich, Digital image steganography using universal distortion, Proc. ACM IH&MMS., New York, NY, USA, (2013), 59–68. |
[15] | L. J. Guo, J. Q. Ni and Y. Q. Shi, uniform embedding for efficient JPEG steganography, IEEE. TIFS., 9 (2014), 814–825. |
[16] | L. J. Guo, J. Q. Ni and W. K. Su, et al., Using statistical image model for JPEG steganography: Uniform Embedding Revisited, IEEE. TIFS., 10 (2015), 2669–2680. |
[17] | Z. Wang, X. Zhang and Z. Yin, Hybrid distortion function for JPEG steganography, JEI., 25 (2016), 050501. |
[18] | Z. Wang, Z. Qian and X. Zhang, et al., On improving distortion functions for JPEG steganography, IEEE Access, 6 (2018), 74917–74930. |
[19] | C. Qin, C. Chang and Y. Chiu, A novel joint data-hiding and compression scheme based on SMVQ and image inpainting, IEEE. TIP., 23 (2014), 969–978. |
[20] | Z. Qian, H. Zhou and X. Zhang, et al., Separable reversible data hiding in encrypted JPEG bitstreams, IEEE. TDSC., 15 (2018), 1055–1067. |
[21] | Z. Qian and X. Zhang, Reversible data hiding in encrypted image with distributed source encoding, IEEE. TCSVT., 26 (2016), 636–646. |
[22] | Z. Qian, X. Zhang and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE. TMM., 16 (2014), 1486–1491. |
[23] | C. Qin, W. Zhang and F. Cao, et al., Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection, J. Sigpro., 153 (2018), 09–122. |
[24] | J. Deng, W. Dong and R. Socher, et al., ImageNet: A large-scale hierarchical image satabase, IEEE CVPR., (2009), 248–255. |
[25] | Beautification softwares "BeautyCam", Meitu Company, Fujian, China, 2018, Available from: https://mt.meipai.com/. |
[26] | Beautification softwares "CAMERA360", Chengdu Pinguo technology co. LTD, Chengdu, China, 2015, Available from: http://www.camera360.com/. |
[27] | Beautification softwares "TianTianPiTu", Tencent Company, Shenzhen, China, 2014, Available from: https://tu.qq.com/. |
[28] | P. Joshi, D. M. Esciriva and V. Godoy, Opencv By example, Penerbit Packt Publishing Ltd, (2016), 87–92. |
[29] | Z. Wang, J. Lv and Q. Wei, et al., Distortion function for spatial image steganography based on the polarity of embedding change, Proc. IWDW., Beijing, China, (2016), 487–493. |
[30] | V. Holub and J. Fridrich, Low complexity features for JPEG steganalysis using undecimated DCT, IEEE. TIFS.,10 (2014), 219–228. |
[31] | J. Kodovsky, J. Fridrich and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE. TIFS., 7 (2012), 432–444. |
[32] | J. Kodovsky and J. Fridrich, Steganalysis of JPEG images using rich models, Proc. ISOP., San Francisco, CA, USA, (2012), 83030A–83030A–13. |