[1] T. Pevny, P. Bas,J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, June 2010 [2] J. Fridrich and J. Kodovsky, “Rich Models for Steganalysis of Digital Images,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 3, pp. 868-882, 2012 [3] B. Li, Z. Li,S. Zhou, “New Steganalytic Features for Spatial Image Steganography based on Derivative Filters and Threshold LBP Operator,” IEEE Transactions on Information Forensics and Security, Vol. 13, No. 5, pp. 1242-1257, May 2018 [4] Y. Qian, J. Dong,W. Wang, “Deep Learning for Steganalysis via Convolutional Neural Networks,” in Proceedings of Media Watermarking, Security, and Forensics 2015, San Francisco, USA, February 2015 [5] G. Xu, H. Wu,Y. Shi, “Structural Design of Convolutional Neural Networks for Steganalysis,” IEEE Signal Processing Letters, Vol. 23, No. 5, pp. 708-712, May 2016 [6] Y. Yuan, L. Wei,B. Feng, “Steganalysis with CNN using Multi-Channels Filtered Residuals,” inProceedings of 3rd International Conference on Cloud Computing and Security (ICCCS 2017), pp. 110-120, Nanjing, China, June 2017 [7] X. Yu, H. Tan,H. Liang, “A Multi-Task Learning CNN for Image Steganalysis,” in Proceedings of 10th IEEE International Workshop on Information Forensics and Security (WIFS 2018), Hong Kong, China, December 2018 [8] Y. Zhang and Q. Yang, “An Overview of Multi-Task Learning,” National Science Review, Vol. 5, No. 1, pp. 34-47, 2018 [9] Y. Qian, D. Jing,W. Wei, “Learning and Transferring Representations for Image Steganalysis using Convolutional Neural Network,” inProceedings of 23rd IEEE International Conference on Image Processing (ICIP 2016), pp. 2752-2756, Phoenix, USA, September 2016 [10] S. J.Pan and Y. Qiang, “A Survey on Transfer Learning,” IEEE Transactions on Knowledge and Data Engineering, Vol. 22, No. 10, pp. 1345-1359, 2010 [11] G. Cancelli, G. Doerr,M. Barni, “A Comparative Study of ±1 Steganalyzers,” inProceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP 2008), pp. 791-796, Cairns, Australia, October 2008 [12] A. Kendall, Y. Gal,R. Cipolla, “Multi-Task Learning using Uncertainty to Weigh Losses for Scene Geometry and Semantics,” inProceedings of 31st Meeting of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2018), pp. 7482-7491, June 2018 [13] A. Kendall and Y. Gal, “What Uncertainties Do We Need in Bayesian Deep Learning for Computer Vision,” inProceedings of 31st Annual Conference on Neural Information Processing Systems (NIPS 2017), pp. 5575-5585, Long Beach, USA, December 2017 [14] J. Yosinski, J. Clune,Y. Bengio, “How Transferable are Features in Deep Neural Networks,” inProceedings of 28th Annual Conference on Neural Information Processing Systems 2014 (NIPS 2014), pp. 3320-3328, Montreal, Canada, December 2014 [15] S. Ren, K. He,R. Girshick, “Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 39, No. 6, pp. 1137-1149, 2017 [16] R. Collobert and J. Weston, “A Unified Architecture for Natural Language Processing,” inProceedings of 25th International Conference on Machine Learning (ICML 2008), pp. 160-167, Helsinki, Finland, July 2008 [17] J. Huang, J. Li,Y. Dong, “Cross-Language Knowledge Transfer using Multilingual Deep Neural Network with Shared Hidden Layers,” inProceedings of 2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2013), pp. 7304-7308, Vancouver, Canada, May 2013 [18] V. Holub and J. Fridrich, “Designing Steganographic Distortion using Directional Filters,” inProceedings of 2012 IEEE International Workshop on Information Forensics and Security (WIFS 2012), pp. 234-239, Tenerife, Spain, December 2012 [19] V. Holub and J. Fridrich, “Digital Image Steganography using Universal Distortion,” inProceedings of 1st ACM Workshop on Information Hiding and Multimedia Security (IH and MMSec 2013), pp. 59-68, Montpellier, France, June 2013 |