DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
- Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, Nenghai Yu
- Computer ScienceIEEE International Conference on Computer Vision
- 25 December 2018
A Denoiser and UPsampler Network (DUP-Net) structure as defenses for 3D adversarial point cloud classification, where the two modules reconstruct surface smoothness by dropping or adding points.
Reversible Data Hiding in Color Image With Grayscale Invariance
- Dongdong Hou, Weiming Zhang, Kejiang Chen, Sian-Jheng Lin, Nenghai Yu
- Computer ScienceIEEE transactions on circuits and systems for…
- 1 February 2019
The unchanged gray version is utilized efficiently in both the embedding processes and the extracting processes, and the reversibility and the property of grayscale invariance are both achieved.
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks
- Hang Zhou, Dongdong Chen, Nenghai Yu
- Computer ScienceComputer Vision and Pattern Recognition
- 1 June 2020
The proposed LG-GAN can support flexible targeted attack on the fly while guaranteeing good attack performance and higher efficiency simultaneously, and is the first generation based 3D point cloud attack method.
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
- Xinzhi Yu, Kejiang Chen, Yaofei Wang, Weixiang Li, Weiming Zhang, Nenghai Yu
- Computer ScienceSignal Processing
- 1 March 2020
Defining Joint Distortion for JPEG Steganography
- Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu
- Computer ScienceInformation Hiding and Multimedia Security…
- 14 June 2018
This paper inspects the embedding change from the spatial domain and proposes a principle of Block Boundary Continuity (BBC) for defining JPEG joint distortion, which aims to restrain blocking artifacts caused by inter-block adjacent modifications and thus effectively preserve the spatial continuity at block boundaries.
Comments on “Steganography Using Reversible Texture Synthesis”
- Hang Zhou, Kejiang Chen, Weiming Zhang, Nenghai Yu
- Computer ScienceIEEE Transactions on Image Processing
- 1 April 2017
This work proposes an attacking method on this steganography, which can not only detect the stego-images but can also extract the hidden messages.
Distortion Design for Secure Adaptive 3-D Mesh Steganography
- Hang Zhou, Kejiang Chen, Weiming Zhang, Yuanzhi Yao, Nenghai Yu
- Computer ScienceIEEE transactions on multimedia
- 1 June 2019
A novel technique for steganography on 3-D meshes so as to resist steganalysis, which relies on some effective steganalytic features such as variation of vertex normal and outperforms the current state of the art.
Adversarial Examples Detection Beyond Image Space
- Kejiang Chen, Yuefeng Chen, Nenghai Yu
- Computer ScienceIEEE International Conference on Acoustics…
- 23 February 2021
This work proposes a method beyond image space by a two-stream architecture, in which the image stream focuses on the pixel artifacts and the gradient stream copes with the confidence artifacts, which outperforms the existing methods under oblivious attacks and is verified effective to defend omniscient attacks.
Adversarial Examples Against Deep Neural Network based Steganalysis
- Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu
- Computer ScienceInformation Hiding and Multimedia Security…
- 14 June 2018
A new strategy is proposed that constructs enhanced covers against neural networks with the technique of adversarial examples and makes a tradeoff between the two analysis systems to improve the comprehensive security.
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio
- Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang, Nenghai Yu
- Computer ScienceIEEE transactions on circuits and systems for…
- 1 July 2020
A novel distortion is presented for audio steganography, inspired by the phenomenon that the modification of audio samples with the low amplitude will be easily detected, and the proposed distortion outperforms the state-of-the-art methods defending strong steganalytic methods.
...
...