└── README.md
/README.md:
--------------------------------------------------------------------------------
1 | # Learning Image Steganography [](.)
2 |
3 |
4 | * ##### 
5 |
6 | **ASDL-GAN** (*Automatic steganographic distortion learning using a generative adversarial network*): [
](https://sci-hub.se/10.1109/lsp.2017.2745572) 
7 |
8 | **UT-GAN** (*An embedding cost learning framework using GAN*): [
](https://sci-hub.se/10.1109/tifs.2019.2922229) [
](https://github.com/JianhuaYang001/spatial-image-steganography) [
](https://github.com/TracyCuiq/UT-GAN) 
9 |
10 | **JS-GAN** (*Towards automatic embedding cost learning for JPEG steganography*): [
](https://www.researchgate.net/profile/Jianhua-Yang-10/publication/334351310_Towards_Automatic_Embedding_Cost_Learning_for_JPEG_Steganography/links/5db59061299bf111d4d0c911/Towards-Automatic-Embedding-Cost-Learning-for-JPEG-Steganography.pdf) 
11 |
12 | **Wu's** (*GAN-based steganography with the concatenation of multiple feature maps*): [
](https://books.google.ca/books?hl=en&lr=&id=h87YDwAAQBAJ&oi=fnd&pg=PA3&dq=GAN-based+steganography+with+the+concatenation+of+multiple+feature+maps&ots=wRZE6lES6b&sig=c5wEVP0VVk05H0Toshl7KuCDHXc#v=onepage&q=GAN-based%2020steganography%2020with%2020the%2020concatenation%2020of%2020multiple%2020feature%2020maps&f=false) 
13 |
14 | **UMC-GAN** (*A stable GAN for image steganography with multi-order feature fusion*) [
](https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=09410643&AN=158693857&h=KyqFSdSM2Z%2FwaVuorZqPqQ1kU6Go70Dl5YNA2X42h4coTsnsj1JzeBngomXvawllUHIGSWap9DmYC2l2UuCUQA%3D%3D&crl=f) 
15 |
16 | **Steg-GMAN** (*Steganography Embedding Cost Learning with Generative Multi-Adversarial Network*): [
](https://ieeexplore.ieee.org/abstract/document/10265249/) 
17 |
18 | **Dynamic Cost Correction** (*Multi-modality ensemble distortion for spatial steganography with dynamic cost correction*) [
](https://ieeexplore.ieee.org/abstract/document/10151943/) 
19 |
20 | **Huang's** (*Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks*) [
](https://dl.acm.org/doi/abs/10.1145/3581783.3612399) 
21 |
22 | **Tang's** (*An Embedded Cost Learning Framework Based on Cumulative Gradient Rewards*) [
](https://link.springer.com/chapter/10.1007/978-981-99-9785-5_19) 
23 |
24 | **ARES** (*ARES: On adversarial robustness enhancement for image steganographic cost learning*):[
](https://ieeexplore.ieee.org/abstract/document/10398515/) 
25 |
26 | * ##### 
27 | **SGAN** (*Steganographic generative adversarial networks*): [
](https://arxiv.org/pdf/1703.05502) [
](https://github.com/dvolkhonskiy/adversarial-steganography) [
](https://github.com/YanLo/steganography_pytorch/tree/b060c048142fef26ccbae1b2cb2c77f5cd7f5387) 
28 |
29 | **SSGAN** (*SSGAN: secure steganography based on generative adversarial networks*): [
](https://arxiv.org/pdf/1707.01613) 
30 |
31 | * ##### 
32 | **CEOA-GAN** (*High-Capacity Steganography Using Object Addition-based Cover Enhancement for Secure Communication in Networks*): [
](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9662244) 
33 |
34 | * ##### 
35 | **Xie's** (*A novel gradient-guided post-processing method for adaptive image steganography*): [
](https://strathprints.strath.ac.uk/83042/1/Xie_etal_SP_2022_A_novel_gradient_guided_post_processing_method_for_adaptive_image_steganography.pdf) 
36 |
37 | * ##### 
38 |
39 | *Cost reassignment for improving security of adaptive steganography using an artificial immune system* [
](https://ieeexplore.ieee.org/abstract/document/9814852/) 
40 |
41 | **CR-AIS** (*Constructing Immune-cover for Improving Holistic Security of Spatial Adaptive Steganography*) [
](https://ieeexplore.ieee.org/abstract/document/10472059/) 
42 |
43 | ------
44 |
45 |
46 | * ##### 
47 | **Zhang's** (*Adversarial examples against deep neural network based steganalysis*): [
](https://sci-hub.se/10.1145/3206004.3206012) 
48 |
49 | **SPS-ENH** (*Adversarial steganography based on sparse cover enhancement*) [
](http://staff.ustc.edu.cn/~zhangwm/Paper/2021_10.pdf) 
50 |
51 | **CAAS** (*Improving security for image steganography using content-adaptive adversarial perturbations*) [
](https://link.springer.com/article/10.1007/s10489-022-04321-6) 
52 |
53 |
54 | * ##### 
55 |
56 | **ADV-EMB** (*CNN-based adversarial embedding for image steganography*): [
](https://sci-hub.se/10.1109/tifs.2019.2891237) 
57 |
58 | **AEN** (*Adaptive spatial steganography based on adversarial examples*): [
](https://sci-hub.se/10.1007/s11042-019-07994-3) 
59 |
60 | **JS-IAE** (*Enhancing JPEG steganography using iterative adversarial examples*): [
](https://sci-hub.se/10.1109/wifs47025.2019.9035101) 
61 |
62 | **Bernard's** (*Explicit optimization of min max steganographic game*): [
](https://sci-hub.se/10.1109/tifs.2020.3021913) 
63 |
64 | **ITE-SYN** (*Image steganography based on iterative adversarial perturbations onto a synchronized-directions sub-image*): [
](https://sci-hub.se/10.1109/icassp39728.2021.9414055) 
65 |
66 | **Liu's** (*A New Adversarial Embedding Method for Enhancing Image Steganography*): [
](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9535158) 
67 |
68 | **Backpack** (*Backpack: A backpropagable adversarial embedding scheme*): [
](https://hal.science/hal-03760241/document) 
69 |
70 | **Liu's** (*Adversarial robust image steganography against lossy JPEG compression*) [
](https://www.sciencedirect.com/science/article/pii/S0165168422002079#sec0008) 
71 |
72 | **AMP** (*Enhancing image steganography via adversarial optimization of the stego distribution*) [
](https://www-sciencedirect-com.remotexs.ntu.edu.sg/science/article/pii/S0165168423002293/pdfft?md5=97096a63eb3b3fd369ca9d9542c9b1b9&pid=1-s2.0-S0165168423002293-main.pdf) 
73 |
74 | **Ma's** (*Enhancing the security of image steganography via multiple adversarial networks and channel attention modules*) [
](https://www.sciencedirect.com/science/article/pii/S1051200423002166#br0520)
75 | 
76 |
77 | **Wang's** (*Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions*) [
](https://dl.acm.org/doi/abs/10.1145/3603377)
78 | 
79 |
80 | **SGS** (*Adversarial steganography embedding via stego generation and selection*) [
](https://ieeexplore.ieee.org/abstract/document/9795096/) 
81 |
82 | **ITPA-PIS** (*An Iterative Two-stage Probability Adjustment Strategy with Progressive Incremental Searching for Image Steganography*) [
](https://ieeexplore.ieee.org/abstract/document/10522816/) 
83 |
84 |
85 | ------
86 |
87 | ### 
88 |
89 | **MCTSteg** (*MCTSteg: A Monte Carlo tree search-based reinforcement learning framework for universal non-additive steganography*): [
](https://arxiv.org/pdf/2103.13689) 
90 |
91 | **SPAR-RL** (*An automatic cost learning framework for image steganography using deep reinforcement learning*): [
](https://sci-hub.se/10.1109/tifs.2020.3025438) 
92 |
93 | **JEC-RL** (*Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge*) [
](https://arxiv.org/pdf/2105.03867) 
94 |
95 | **PICO-RL** (*Payload-independent direct cost learning for image steganography*) [
](https://ieeexplore.ieee.org/abstract/document/10178049/) 
96 |
97 | **JoPoL** (*Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism*) [
](https://link.springer.com/article/10.1007/s11432-021-3453-5) 
98 |
99 | **ReLOAD** (*ReLOAD: Using reinforcement learning to optimize asymmetric distortion for additive steganography*) [
](https://ieeexplore.ieee.org/abstract/document/10041967/) 
100 |
101 | **RLAE** (*Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning*) [
](https://ieeexplore.ieee.org/abstract/document/10219957/) 
102 |
103 |
104 | ------
105 |
106 | ### 
107 |
108 | **PARIS** (*Provably Secure Robust Image Steganography*) [
](https://ieeexplore.ieee.org/abstract/document/10306313/) 
109 |
110 | **Zhang's** (*Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography*) [
](https://ieeexplore.ieee.org/abstract/document/10418202/) 
111 |
112 | ------
113 | ### 
114 |
115 | **HUGO** (*Using high-dimensional image models to perform highly undetectable steganography*): [
](https://sci-hub.se/10.1007/978-3-642-16435-4_13) [
](http://dde.binghamton.edu/download/stego_algorithms/download/HUGO_bounding_matlab.zip)
116 |
117 | **WOW** (*Designing steganographic distortion using directional filters*): [
](http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf) [
](http://dde.binghamton.edu/download/stego_algorithms/download/WOW_matlab.zip)
118 |
119 | **S-UNIWARD** (*Universal distortion function for steganography in an arbitrary domain*): [
](http://dde.binghamton.edu/vholub/pdf/EURASIP14_Universal_Distortion_Function_for_Steganography_in_an_Arbitrary_Domain.pdf) [
](http://dde.binghamton.edu/download/stego_algorithms/download/S-UNIWARD_matlab.zip)
120 |
121 | **HILL** (*A new cost function for spatial image steganography*) [
](https://sci-hub.se/10.1109/icip.2014.7025854) [
](https://github.com/daniellerch/stegolab/tree/master/HILL) [
](https://github.com/TracyCuiq/Hill-python)
122 |
123 | ------
124 |
125 | ### 
126 |
127 | **MiPOD** (*Content-Adaptive Steganography by Minimizing Statistical Detectability*): [
](http://ws.binghamton.edu/fridrich/Research/MiPOD.pdf) [
](http://dde.binghamton.edu/download/stego_algorithms/download/MiPOD_matlab.zip)
128 |
129 | **J-MiPOD** (Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector): [
](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9534894) [
](https://codeocean.com/capsule/7800700/tree/v2)
130 |
131 | **MVG** (*Improving Steganographic Security by Synchronizing the Selection Channel*): [
](http://dde.binghamton.edu/kodovsky/pdf/ICASSP2013_Multivariate_Gaussian_model.pdf) [
](http://dde.binghamton.edu/download/stego_algorithms/download/MVG_matlab.zip)
132 |
133 | **MG** (*Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model*): [
](http://dde.binghamton.edu/vsedighi/pdf/SPIE2015_Content_Adaptive_Pentary_Steganography_Using_The_Multivariate_Generalized_Gaussian_Cover_Model.pdf) [
](http://dde.binghamton.edu/download/stego_algorithms/download/MG_matlab.zip)
134 |
135 | ------
136 |
137 | ### 
138 |
139 | **CMD** (*A strategy of clustering modification directions in spatial image steganography*): [
](https://sci-hub.se/10.1109/tifs.2015.2434600)
140 |
141 | **SMD** (*Improving steganographic security by synchronizing the selection channel*): [
](https://sci-hub.se/10.1145/2756601.2756620)
142 |
143 | ------
144 |
145 | ### 
146 |
147 | **Gibbs**(*Gibbs construction in steganography*): [
](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5580091) 
148 |
149 | **STC**(*Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes*): [
](https://sci-hub.se/10.1109/tifs.2011.2134094) 
150 |
151 | **SPC** (*Designing near-optimal steganographic codes in practice based on polar codes*) [
](http://home.ustc.edu.cn/~zh2991/20TCOM_SPC/2020%2020TCOM%2020Designing%2020Near-Optimal%2020Steganographic%2020Codes%2020in%2020Practice%2020Based%2020on%2020Polar%2020Codes.pdf) 
152 |
153 | ### 
154 |
155 | *Cost reassignment for improving security of adaptive steganography using an artificial immune system*: [
](https://ieeexplore.ieee.org/abstract/document/9814852/) 
156 |
157 | *A Steganography Immunoprocessing Framework against CNN-Based and Handcrafted Steganalysis*: [
](https://ieeexplore.ieee.org/abstract/document/10547040/) 
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
--------------------------------------------------------------------------------