2021
DOI: 10.1155/2021/5538720
|View full text |Cite|
|
Sign up to set email alerts
|

Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks

Abstract: Deep neural networks have become the foundation of many modern intelligent systems. Recently, the author has explored adversarial learning for invertible steganography (ALIS) and demonstrated the potential of deep neural networks to reinvigorate an obsolete invertible steganographic method. With the worldwide popularisation of the Internet of things and cloud computing, invertible steganography can be recognised as a favourable way of facilitating data management and authentication due to the ability to embed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 58 publications
0
10
0
Order By: Relevance
“…Later, Hong et al [24] utilized a side match smoothness algorithm to reduce the error rate. Deep learning technique is also introduced to improve the smoothness algorithm [25]. In these schemes, the processes of image recovery and data extraction are joined.…”
Section: Introductionmentioning
confidence: 99%
“…Later, Hong et al [24] utilized a side match smoothness algorithm to reduce the error rate. Deep learning technique is also introduced to improve the smoothness algorithm [25]. In these schemes, the processes of image recovery and data extraction are joined.…”
Section: Introductionmentioning
confidence: 99%
“…There are six 512 × 512 medical images, i.e., “Kindey_A,” “Kindey_B,” “Brain_A,” “Brain_B,” “Sketeton_A,” and “Sketeton_B,” used as test images, and they are shown in Figure 4 . In our experiments, several statistical metrics, such as PSNR (Peak signal-to-noise ratio) [ 31 ] and EC, are measured for the performance evaluation.…”
Section: Resultsmentioning
confidence: 99%
“…However, the paper divides RGB channels into 8 × 8 × 3 blocks, which cannot resist a cropping attack. Image processing [40,41] could affect the accuracy of watermark extraction.…”
Section: Discussionmentioning
confidence: 99%