└── README.md
/README.md:
--------------------------------------------------------------------------------
1 | # Learning Deep Hidng
2 | [](.) [](.)
3 |
4 | This repo collects the paper list of *Deep Hiding*.
5 | I have compiled summaries of various papers and organized them into categories. Please feel free to contribute by submitting pull requests!
6 |
7 | ##### 
8 | - [2024/06] **[StegoGAN: Leveraging Steganography for Non-Bijective Image-to-Image Translation](https://openaccess.thecvf.com/content/CVPR2024/papers/Wu_StegoGAN_Leveraging_Steganography_for_Non-Bijective_Image-to-Image_Translation_CVPR_2024_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=StegoGAN%3A+Leveraging+Steganography+for+Non-Bijective+Image-to-Image+Translation&btnG=) 
9 | - [2024/03] **[StegaStyleGAN: Towards Generic and Practical Generative Image Steganography](https://ojs.aaai.org/index.php/AAAI/article/download/27776/27591)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=StegaStyleGAN%3A+Towards+Generic+and+Practical+Generative+Image+Steganography&btnG=) 
10 | - [2024] **[Cross: Diffusion model makes controllable, robust and secure image steganography](https://proceedings.neurips.cc/paper_files/paper/2023/file/ff99390b6e942fb1dd7023f787fb0a27-Paper-Conference.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Cross%3A+Diffusion+model+makes+controllable%2C+robust+and+secure+image+steganography&btnG=)  
11 | - [2023/10] **[StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model](https://dl.acm.org/doi/abs/10.1145/3581783.3612514)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=StegaDDPM%3A+Generative+Image+Steganography+based+on+Denoising+Diffusion+Probabilistic+Model&btnG=)  
12 | - [2023] **[Generative steganography via auto-generation of semantic object contours](https://ieeexplore.ieee.org/abstract/document/10105920/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Generative+steganography+via+auto-generation+of+semantic+object+contours&btnG=) 
13 | - [2023] **[Secret-to-image reversible transformation for generative steganography](https://arxiv.org/pdf/2203.06598)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Secret-to-image+reversible+transformation+for+generative+steganography&btnG=) 
14 | - [2023/08] **[Robust steganography without embedding based on secure container synthesis and iterative message recovery](https://www.ijcai.org/proceedings/2023/0538.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Robust+steganography+without+embedding+based+on+secure+container+synthesis+and+iterative+message+recovery&btnG=) 
15 | - [2017] **[Generating steganographic images via adversarial training](https://proceedings.neurips.cc/paper/2017/file/fe2d010308a6b3799a3d9c728ee74244-Paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Generating+steganographic+images+via+adversarial+training&btnG=) 
16 |
17 | ##### 
18 | - [2024/05] **[Diffusion-Based Hierarchical Image Steganography](https://arxiv.org/pdf/2405.11523)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Diffusion-Based+Hierarchical+Image+Steganography&btnG=)  
19 | - [2024/05] **[PPRSteg: Printing and Photography Robust QR Code
20 | Steganography via Attention Flow-Based Model](https://arxiv.org/pdf/2405.16414)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=PPRSteg%3A+Printing+and+Photography+Robust+QR+Code+Steganography+via+Attention+Flow-Based+Model&btnG=)
21 | - [2024/05] **[Joint Adaptive Robust Steganography Network](https://ieeexplore.ieee.org/abstract/document/10518172/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Joint+Adaptive+Robust+Steganography+Network&btnG=) 
22 | - [2023/04] **[IRWArt: Levering Watermarking Performance for Protecting High-quality Artwork Images](https://dl.acm.org/doi/abs/10.1145/3543507.3583489)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Irwart%3A+Levering+watermarking+performance+for+protecting+high-quality+artwork+images&btnG=)  
23 | - [2023/03] **[Low-frequency image deep steganography: Manipulate the frequency distribution to hide secrets with tenacious robustness](https://arxiv.org/pdf/2303.13713)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Low-frequency+image+deep+steganography%3A+Manipulate+the+frequency+distribution+to+hide+secrets+with+tenacious+robustness&btnG=)
24 | - [2023] **[Flow-based robust watermarking with invertible noise layer for black-box distortions](https://ojs.aaai.org/index.php/AAAI/article/view/25633)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Flow-based+robust+watermarking+with+invertible+noise+layer+for+black-box+distortions&btnG=)  
25 | - [2023] **[Flexible and secure watermarking for latent diffusion model](https://dl.acm.org/doi/abs/10.1145/3581783.3612448)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Flexible+and+secure+watermarking+for+latent+diffusion+model&btnG=)  
26 | - [2022] **[Robust invertible image steganography](https://openaccess.thecvf.com/content/CVPR2022/papers/Xu_Robust_Invertible_Image_Steganography_CVPR_2022_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Robust+invertible+image+steganography&btnG=)  
27 | - [2022] **[Hiding images into images with real-world robustness](https://arxiv.org/pdf/2110.05689)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hiding+images+into+images+with+real-world+robustness&btnG=) 
28 | - [2020] **[High-capacity robust image steganography via adversarial network](https://koreascience.kr/article/JAKO202011161036615.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=High-capacity+robust+image+steganography+via+adversarial+network&btnG=) 
29 | - [2019] **[HidingGAN: High capacity information hiding with generative adversarial network](https://onlinelibrary.wiley.com/doi/abs/10.1111/cgf.13846)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hiding-+GAN%3A+High+capacity+information+hiding+with+generative+adversar-+ial+network&btnG=) 
30 | - [2018] **[HiDDeN: Hiding data with deep networks](https://openaccess.thecvf.com/content_ECCV_2018/papers/Jiren_Zhu_HiDDeN_Hiding_Data_ECCV_2018_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hidden%3A+Hiding+data+with+deep+networks&btnG=) 
31 |
32 |
33 |
34 |
35 | ##### 
36 | - [2024/06] **[StampOne: Addressing Frequency Balance in Printer-proof Steganography](https://openaccess.thecvf.com/content/CVPR2024W/WMF/papers/Shadmand_StampOne_Addressing_Frequency_Balance_in_Printer-proof_Steganography_CVPRW_2024_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=StampOne%3A+Addressing+Frequency+Balance+in+Printer-proof+Steganography&btnG=) 
37 | - [2024/05] **[DBDH: A Dual-Branch Dual-Head Neural Network for Invisible Embedded Regions Localization](https://arxiv.org/pdf/2405.03436)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=2005&sciodt=0%2C5&as_ylo=2024&cites=12518573255228036630&scipsc=&q=DBDH%3A+A+Dual-Branch+Dual-Head+Neural+Network+for+Invisible+Embedded+Regions+Localization&btnG=)
38 | - [2022] **[Pimog: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network](https://dl.acm.org/doi/pdf/10.1145/3503161.3548049)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Pimog%3A+An+effective+screen-shooting+noise-layer+simulation+for+deep-learning-based+watermarking+network&btnG=) 
39 | - [2022] **[Learning invisible markers for hidden codes in offline-to-online photography](https://openaccess.thecvf.com/content/CVPR2022/papers/Jia_Learning_Invisible_Markers_for_Hidden_Codes_in_Offline-to-Online_Photography_CVPR_2022_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Learning+invisible+markers+for+hidden+codes+in+offline-to-online+photography&btnG=) 
40 | - [2021] **[TERA: Screen-to-camera image code with transparency, efficiency, robustness and adaptability](https://ieeexplore.ieee.org/abstract/document/9362313)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=TERA%3A+screen-to-camera+image+code+with+transparency%2C+efficiency%2C+robustness+and+adaptabili&btnG=) 
41 | - [2020] **[RIHOOP: Robust invisible hyperlinks in offline and online photographs](https://drive.google.com/file/d/18SmByaf2XmsLSc0CLZPrWj0WRAzTOR7V/view)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=RIHOOP%3A+robust+invisible+hyperlinks+in+offline+and+online+photographs&btnG=) 
42 | - [2020] **[Stegastamp: Invisible hyperlinks in physical photographs](https://openaccess.thecvf.com/content_CVPR_2020/papers/Tancik_StegaStamp_Invisible_Hyperlinks_in_Physical_Photographs_CVPR_2020_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=%E2%80%9CStegastamp%3A+Invisible+hyperlinks+in+physical+photographs%2C&btnG=) 
43 | - [2020] **[UDH: Universal deep hiding for steganography, watermarking, and light field messaging](https://proceedings.neurips.cc/paper_files/paper/2020/file/73d02e4344f71a0b0d51a925246990e7-Paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=UDH%3A+Universal+deep+hiding+for+steganography%2C+watermarking%2C+and+light+field+messaging&btnG=) 
44 | - [2019] **[Light field messaging with deep photographic steganography](https://openaccess.thecvf.com/content_CVPR_2019/papers/Wengrowski_Light_Field_Messaging_With_Deep_Photographic_Steganography_CVPR_2019_paper.pdf)** [
](https://scholar.google.com/scholar?q=Light+field+messaging+with+deep+photographic+steganography&hl=en&as_sdt=0,5) 
45 |
46 |
47 |
48 | ##### 
49 | - [2024/04] **[Hiding Face Into Background: A Proactive Countermeasure Against Malicious Face Swapping](https://ieeexplore.ieee.org/abstract/document/10530466)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hiding+Face+Into+Background%3A+A+Proactive+Countermeasure+Against+Malicious+Face+Swapping&btnG=) 
50 | - [2023/12] **[Editguard: Versatile image watermarking for tamper localization and copyright protection](https://openaccess.thecvf.com/content/CVPR2024/papers/Zhang_EditGuard_Versatile_Image_Watermarking_for_Tamper_Localization_and_Copyright_Protection_CVPR_2024_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Editguard%3A+Versatile+image+watermarking+for+tamper+localization+and+copyright+protection&btnG=)  
51 | - [2021] **[Fixed neural network steganography: Train the images, not the network](https://drive.google.com/file/d/1Ca-fkAfrhBXXWs-Y5zq3I0Tn2zRGBPou/view)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Fixed+neural+network+steganography%3A+Train+the+images%2C+not+the+network&btnG=) 
52 | - [2021] **[Seek-and-hide: adversarial steganography via deep reinforcement learning](https://ieeexplore.ieee.org/abstract/document/9546656/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Seek-and-hide%3A+Adversarial+steganography+via+deep+reinforcement+learning&btnG=) 
53 | - [2021] **[Multitask identity-aware image steganography via minimax optimization](https://arxiv.org/pdf/2107.05819)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Multitask+identity-aware+image+steganography+via+minimax+optimization&btnG=) 
54 | - [2021] **[HCISNet: Higher‐capacity invisible image steganographic network](https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/ipr2.12329)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=HCISNet%3A+Higher-capacity+invisible+image+steganographic+network&btnG=) 
55 |
56 |
57 | ##### 
58 | - [2024/04] **[DHU-Net: High-capacity binary data hiding network based on improved U-Net](https://www.sciencedirect.com/science/article/pii/S0925231224000857)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=DHU-Net%3A+High-capacity+binary+data+hiding+network+based+on+improved+U-Net&btnG=) 
59 | - [2024/04] **[A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models](https://ieeexplore.ieee.org/abstract/document/10448420/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=A+Keyless+Extraction+Framework+Targeting+at+Deep+Learning+Based+Image-Within-Image+Models&btnG=) 
60 | - [2024/03] **[StegFormer: Rebuilding the Glory of Autoencoder-Based Steganography](https://ojs.aaai.org/index.php/AAAI/article/download/28051/28112)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=StegFormer%3A+Rebuilding+the+Glory+of+Autoencoder-Based+Steganography&btnG=) 
61 | - [2024/02] **[A fitting model with optimal Multiple Image Hiding effect](https://www.sciencedirect.com/science/article/pii/S0925231223012699)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=A+fitting+model+with+optimal+Multiple+Image+Hiding+effect&btnG=) 
62 | - [2024/01] **[Image hiding using invertible neural network and similarity of bits pairs](https://www.sciencedirect.com/science/article/pii/S1568494623011985)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Image+hiding+using+invertible+neural+network+and+similarity+of+bits+pairs&btnG=) 
63 | - [2023] **[Hiding Multiple Images into a Single Image Using Up-sampling](https://ieeexplore.ieee.org/abstract/document/10272621/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hiding+Multiple+Images+into+a+Single+Image+Using+Up-sampling&btnG=) 
64 | - [2023] **[Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction](https://link.springer.com/article/10.1007/s00521-023-08274-w)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Deep+adaptive+hiding+network+for+image+hiding+using+attentive+frequency+extraction+and+gradual+depth+extraction&btnG=) 
65 | - [2023] **[AFcIHNet: Attention feature-constrained network for single image information hiding](https://www.sciencedirect.com/science/article/pii/S0952197623012897)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=AFcIHNet%3A+Attention+feature-constrained+network+for+single+image+information+hiding&btnG=) 
66 | - [2022] **[DeepMIH: Deep invertible network for multiple image hiding](https://ieeexplore.ieee.org/abstract/document/9676416/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=DeepMIH%3A+Deep+invertible+network+for+multiple+image+hiding&btnG=)   
67 | - [2021] **[FCANet: Frequency channel attention networks](https://openaccess.thecvf.com/content/ICCV2021/papers/Qin_FcaNet_Frequency_Channel_Attention_Networks_ICCV_2021_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=FCANet%3A+Frequency+channel+attention+networks&btnG=) 
68 | - [2021] **[HiNet: Deep image hiding by invertible network](https://openaccess.thecvf.com/content/ICCV2021/papers/Jing_HiNet_Deep_Image_Hiding_by_Invertible_Network_ICCV_2021_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=HiNet%3ADeep+image+hiding+by+invertible+network&btnG=) [
](https://github.com/TomTomTommi/HiNet)  
69 | - [2021] **[Large-capacity image steganography based on invertible neural networks](https://openaccess.thecvf.com/content/CVPR2021/papers/Lu_Large-Capacity_Image_Steganography_Based_on_Invertible_Neural_Networks_CVPR_2021_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Large-capacity+image+steganography+based+on+invertible+neural+networks&btnG=)  
70 | - [2021] **[Channel attention image steganography with generative adversarial networks](https://ieeexplore.ieee.org/abstract/document/9667243/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Channel+attention+image+steganography+with+generative+adversarial+networks&btnG=) 
71 | - [2021] **[A data hiding scheme based on U-Net and wavelet transform](https://www.sciencedirect.com/science/article/pii/S0950705121002859)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=A+data+hiding+scheme+based+on+U-Net+and+wavelet+transform&btnG=) 
72 | - [2020] **[Attention based data hiding with generative adversarial networks](https://ojs.aaai.org/index.php/AAAI/article/view/5463/5319)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Attention+based+data+hiding+with+generative+adversarial+networks&btnG=) 
73 | - [2019] **[Invisible steganography via generative adversarial networks](https://link.springer.com/content/pdf/10.1007/s11042-018-6951-z.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Invisible+steganography+via+gen-+erative+adversarial+networks&btnG=) 
74 | - [2019] **[Hiding images within images](https://ieeexplore.ieee.org/iel7/34/4359286/08654686.pdf)** [
](https://ieeexplore.ieee.org/abstract/document/8654686/)  
75 | - [2019] **[Image steganography using texture features and GANs](https://ieeexplore.ieee.org/abstract/document/8852252/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=mage+steganography+using+texture+features+and+GANs&btnG=) 
76 | - [2018] **[End-to-end trained CNN encoder-decoder networks for image steganography](http://openaccess.thecvf.com/content_ECCVW_2018/papers/11132/Rehman_End-to-End_Trained_CNN_Encoder-Decoder_Networks_For_Image_Steganography_ECCVW_2018_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=End-to-end+trained+cnn+encoder-+decoder+networks+for+image+steganography&btnG=) 
77 | - [2017] **[Hiding images in plain sight: Deep steganography](https://proceedings.neurips.cc/paper_files/paper/2017/file/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Hiding+images+in+plain+sight%3A+Deep+steganography&btnG=) 
78 |
79 |
80 |
81 |
82 | ##### 
83 | - [2024/04] **[Image Steganography with Deep Orthogonal Fusion of Multi-Scale Channel Attention](https://ieeexplore.ieee.org/abstract/document/10446373/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Image+Steganography+with+Deep+Orthogonal+Fusion+of+Multi-Scale+Channel+Attention&btnG=) 
84 | - [2024/03] **[Conditional image hiding network based on style transfer](https://ieeexplore.ieee.org/abstract/document/10446373/)** [
](https://www-sciencedirect-com.remotexs.ntu.edu.sg/science/article/pii/S0020025524001385?via%3Dihub) 
85 | - [2024/02] **[DUIANet: A double layer U-Net image hiding method based on improved Inception module and attention mechanism](https://www.sciencedirect.com/science/article/pii/S1047320323002857)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=DUIANet%3A+A+double+layer+U-Net+image+hiding+method+based+on+improved+Inception+module+and+attention+mechanism&btnG=) 
86 | - [2024/02] **[Meta Security Metric Learning for Secure Deep Image Hiding](https://ieeexplore.ieee.org/abstract/document/10428058/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Meta+Security+Metric+Learning+for+Secure+Deep+Image+Hiding&btnG=)  
87 | - [2024/01] **[Conditional image hiding network based on style transfer](https://www.sciencedirect.com/science/article/pii/S0020025524001385)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Conditional+image+hiding+network+based+on+style+transfer&btnG=) 
88 | - [2023] **[Securing Fixed Neural Network Steganography](https://arxiv.org/pdf/2309.09700)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Securing+Fixed+Neural+Network+Steganography&btnG=) 
89 |
90 |
91 |
92 |
93 | ##### 
94 | - [2024/02] **[Purified and Unified Steganographic Network](https://arxiv.org/pdf/2405.15118)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Purified+and+Unified+Steganographic+Network&btnG=) 
95 |
96 |
97 | ##### 
98 | - [2024/05] **[GS-Hider: Hiding Messages into 3D Gaussian Splatting](https://arxiv.org/pdf/2405.15118)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=GS-Hider%3A+Hiding+Messages+into+3D+Gaussian+Splatting&btnG=) 
99 |
100 | ##### 
101 | - [2024/06] **[StegaNeRV: Video Steganography using Implicit Neural Representation](https://openaccess.thecvf.com/content/CVPR2024W/INRV/papers/Biswal_StegaNeRV_Video_Steganography_using_Implicit_Neural_Representation_CVPRW_2024_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=https%3A%2F%2Fopenaccess.thecvf.com%2Fcontent%2FCVPR2024W%2FINRV%2Fpapers%2FBiswal_StegaNeRV_Video_Steganography_using_Implicit_Neural_Representation_CVPRW_2024_paper.pdf&btnG=) 
102 | - [2023] **[Large-capacity and flexible video steganography via invertible neural network](http://openaccess.thecvf.com/content/CVPR2023/papers/Mou_Large-Capacity_and_Flexible_Video_Steganography_via_Invertible_Neural_Network_CVPR_2023_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Large-capacity+and+flexible+video+steganography+via+invertible+neural+network&btnG=)  
103 | - [2023] **[VHNet: A Video Hiding Network with robustness to video coding](https://www.sciencedirect.com/science/article/pii/S2214212623000996)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=VHNet%3A+A+Video+Hiding+Network+with+robustness+to+video+coding&btnG=) 
104 |
105 | ##### 
106 | - [2023/08] **[Wavmark: Watermarking for audio generation](https://arxiv.org/pdf/2308.12770)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Wavmark%3A+Watermarking+for+audio+generation&btnG=)
107 |
108 | ##### 
109 | - [2023] **[Invertible Energy-Aware Images](https://ieeexplore.ieee.org/abstract/document/10266736/)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=https%3A%2F%2Fieeexplore.ieee.org%2Fabstract%2Fdocument%2F10266736%2F&btnG=) 
110 |
111 | ##### 
112 | - [2023] **[Copyrnerf: Protecting the copyright of neural radiance fields](http://openaccess.thecvf.com/content/ICCV2023/papers/Luo_CopyRNeRF_Protecting_the_CopyRight_of_Neural_Radiance_Fields_ICCV_2023_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Copyrnerf%3A+Protecting+the+copyright+of+neural+radiance+fields&btnG=) 
113 | - [2023] **[Steganerf: Embedding invisible information within neural radiance fields](http://openaccess.thecvf.com/content/ICCV2023/papers/Li_StegaNeRF_Embedding_Invisible_Information_within_Neural_Radiance_Fields_ICCV_2023_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Steganerf%3A+Embedding+invisible+information+within+neural+radiance+fields&btnG=) 
114 |
115 | ##### 
116 | - [2024/06] **[Are Deepfakes a Game Changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?](https://hal.science/hal-04601453/document)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Are+Deepfakes+a+Game+Changer+in+Digital+Images+Steganography+Leveraging+the+Cover-Source-Mismatch%3F&btnG=) 
117 |
118 |
119 | ##### 
120 | - [2024] **[An invisible, robust copyright protection method for DNN-generated content](https://www.sciencedirect.com/science/article/pii/S0893608024003150)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=An+invisible%2C+robust+copyright+protection+method+for+DNN-generated+content&btnG=) 
121 |
122 |
123 | ##### 
124 | - [2023] **[Large-capacity and flexible video steganography via invertible neural network](https://arxiv.org/pdf/2308.01512)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Erase+and+repair%3A+An+efficient+box-free+removal+attack+on+high-capacity+deep+hiding&btnG=) 
125 |
126 |
127 | ##### 
128 | - [2024] **[Learning-based image steganography and watermarking: A survey](http://openaccess.thecvf.com/content/CVPR2023/papers/Mou_Large-Capacity_and_Flexible_Video_Steganography_via_Invertible_Neural_Network_CVPR_2023_paper.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Learning-based+image+steganography+and+watermarking%3A+A+survey&btnG=) 
129 | - [2024] **[When deep learning meets watermarking: A survey of application, attacks and defenses](https://www.sciencedirect.com/science/article/pii/S0920548923001113)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=When+deep+learning+meets+watermarking%3A+A+survey+of+application%2C+attacks+and+defenses&btnG=) 
130 | - [2022] **[A comprehensive survey on robust image watermarking](https://pure.port.ac.uk/ws/files/50956558/Survey_on_Watermarking_pp.pdf)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=A+comprehensive+survey+on+robust+image+watermarking&btnG=) 
131 | - [2021] **[A brief survey on deep learning based data hiding](https://arxiv.org/pdf/2103.01607)** [
](https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=A+brief+survey+on+deep+learning+based+data+hiding&btnG=)
--------------------------------------------------------------------------------