共 30 条
[2]
Bin Li, 2018, IEEE Signal Processing Letters, V25, P650, DOI [10.1109/lsp.2018.2816569, 10.1109/LSP.2018.2816569]
[3]
An Approach to Information Hiding in Low Bit-rate Speech Stream
[J].
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE,
2008,
[5]
Audio Steganalysis With Convolutional Neural Network
[J].
IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY,
2017,
:85-90
[6]
Generative Adversarial Networks: A Literature Review
[J].
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,
2020, 14 (12)
:4625-4647
[7]
Fridrich, 2014, STEGANOGRAPHY DIGITA, P107
[8]
ITCN: An Intelligent Trust Collaboration Network System in IoT
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2022, 9 (01)
:203-218
[9]
Lee D., 2020, P 2020 ACM WORKSHOP, P11