ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.01607
  4. Cited By
A Brief Survey on Deep Learning Based Data Hiding
v1v2 (latest)

A Brief Survey on Deep Learning Based Data Hiding

2 March 2021
Chaoning Zhang
Chenguo Lin
Philipp Benz
Kejiang Chen
Weiming Zhang
In So Kweon
ArXiv (abs)PDFHTML

Papers citing "A Brief Survey on Deep Learning Based Data Hiding"

22 / 22 papers shown
Title
Universal Adversarial Perturbations Through the Lens of Deep
  Steganography: Towards A Fourier Perspective
Universal Adversarial Perturbations Through the Lens of Deep Steganography: Towards A Fourier Perspective
Chaoning Zhang
Philipp Benz
Adil Karjauv
In So Kweon
AAML
76
42
0
12 Feb 2021
Multi-Stage Residual Hiding for Image-into-Audio Steganography
Multi-Stage Residual Hiding for Image-into-Audio Steganography
Wenxue Cui
Shaohui Liu
F. Jiang
Yongliang Liu
Debin Zhao
46
18
0
06 Jan 2021
Towards Robust Data Hiding Against (JPEG) Compression: A
  Pseudo-Differentiable Deep Learning Approach
Towards Robust Data Hiding Against (JPEG) Compression: A Pseudo-Differentiable Deep Learning Approach
Chaoning Zhang
Adil Karjauv
Philipp Benz
In So Kweon
34
11
0
30 Dec 2020
DeepMorph: A System for Hiding Bitstrings in Morphable Vector Drawings
DeepMorph: A System for Hiding Bitstrings in Morphable Vector Drawings
Søren Rasmussen
Karsten O. Noe
Oliver G. Hjermitslev
Henrik Pedersen
41
1
0
19 Nov 2020
Adversarial Watermarking Transformer: Towards Tracing Text Provenance
  with Data Hiding
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi
Mario Fritz
WaLM
51
151
0
07 Sep 2020
Robust Spatial-spread Deep Neural Image Watermarking
Robust Spatial-spread Deep Neural Image Watermarking
Marcin Plata
P. Syga
WIGM
28
16
0
24 May 2020
Distortion Agnostic Deep Watermarking
Distortion Agnostic Deep Watermarking
Xiyang Luo
Ruohan Zhan
Huiwen Chang
Feng Yang
P. Milanfar
WIGM
57
163
0
14 Jan 2020
ROMark: A Robust Watermarking System Using Adversarial Training
ROMark: A Robust Watermarking System Using Adversarial Training
Huiying Li
Sergul Aydore
AAML
50
39
0
02 Oct 2019
Robust Invisible Video Watermarking with Attention
Robust Invisible Video Watermarking with Attention
Ke-Yue Zhang
Lei Xu
Alfredo Cuesta-Infante
K. Veeramachaneni
WIGM
45
120
0
03 Sep 2019
Steganography using a 3 player game
Steganography using a 3 player game
Mehdi Yedroudj
Frédéric Comby
Marc Chaumont
GAN
44
37
0
14 Jul 2019
StegaStamp: Invisible Hyperlinks in Physical Photographs
StegaStamp: Invisible Hyperlinks in Physical Photographs
Matthew Tancik
B. Mildenhall
Ren Ng
WIGM
85
374
0
10 Apr 2019
Hide and Speak: Towards Deep Neural Networks for Speech Steganography
Hide and Speak: Towards Deep Neural Networks for Speech Steganography
Felix Kreuk
Yossi Adi
Bhiksha Raj
Rita Singh
Joseph Keshet
49
25
0
07 Feb 2019
SteganoGAN: High Capacity Image Steganography with GANs
SteganoGAN: High Capacity Image Steganography with GANs
Ke-Yue Zhang
Alfredo Cuesta-Infante
Lei Xu
K. Veeramachaneni
GAN
60
212
0
12 Jan 2019
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks
Mahdi Ahmadi
Alireza Norouzi
S. M. Reza Soroushmehr
N. Karimi
Kayvan Najarian
S. Samavi
Ali Emami
WIGM
36
224
0
16 Oct 2018
HiDDeN: Hiding Data With Deep Networks
HiDDeN: Hiding Data With Deep Networks
Jiren Zhu
Russell Kaplan
Justin Johnson
Li Fei-Fei
WIGM
54
753
0
26 Jul 2018
Invisible Steganography via Generative Adversarial Networks
Invisible Steganography via Generative Adversarial Networks
Ru Zhang
Shiqi Dong
Jianyi Liu
AAMLGAN
50
204
0
23 Jul 2018
Generative Steganography by Sampling
Generative Steganography by Sampling
Zhuo Zhang
Jia-Wei Liu
Yan Ke
Yu-Zhou Lei
Jun Li
Minqing Zhang
Xiaoyuan Yang
GANDiffM
44
33
0
26 Apr 2018
Detecting Adversarial Examples - A Lesson from Multimedia Forensics
Detecting Adversarial Examples - A Lesson from Multimedia Forensics
Pascal Schöttle
Alexander Schlögl
Cecilia Pasquini
Rainer Böhme
AAML
38
4
0
09 Mar 2018
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
The Unreasonable Effectiveness of Deep Features as a Perceptual Metric
Richard Y. Zhang
Phillip Isola
Alexei A. Efros
Eli Shechtman
Oliver Wang
EGVM
377
11,877
0
11 Jan 2018
Generating Steganographic Images via Adversarial Training
Generating Steganographic Images via Adversarial Training
Jamie Hayes
G. Danezis
AAMLGAN
75
277
0
01 Mar 2017
Deep learning is a good steganalysis tool when embedding key is reused
  for different images, even if there is a cover source-mismatch
Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch
L. Pibre
Pasquet Jérôme
Dino Ienco
Marc Chaumont
52
145
0
16 Nov 2015
StegExpose - A Tool for Detecting LSB Steganography
StegExpose - A Tool for Detecting LSB Steganography
B. Boehm
LLMSV
43
131
0
24 Oct 2014
1