1 |
SUBHEDAR M S, MANKAR V H. Current status and key issues in image steganography: A survey[J]. Computer Science Review, 2014, 13-14: 95-113.
|
2 |
HUSSAIN M, WAHAB A W A, IDRIS Y I B, et al. Image steganography in spatial domain: A survey[J]. Signal Processing: Image Communication, 2018, 65: 46-66.
|
3 |
DAI H N, ZHENG Z B, ZHANG Y. Blockchain for internet of things: A survey[J]. IEEE Internet of Things Journal, 2019, 6(5): 8076-8094.
|
4 |
FENG Q, HE D B, Zeadally S, et al. A survey on privacy protection in blockchain system[J]. Journal of Network and Computer Applications, 2019, 126: 45-58.
|
5 |
MONRAT A A, SCHELÉN O, ANDERSSON K. A survey of blockchain from the perspectives of applications, challenges, and opportunities[J]. IEEE Access, 2019, 7: 117134-117151.
|
6 |
PARTALA J. Provably secure covert communication on blockchain[J]. Cryptography, 2018, 2(3): 18.
|
7 |
BASUKI A I, ROSIYADI D. Joint transaction-Image steganography for high capacity covert communication[C]//2019 International Conference on Computer, Control, Informatics and its Applications(IC3INA). Tangerang: IEEE, 2019: 41-46.
|
8 |
LIU S, LIU Y X, FENG C, et al. Blockchain privacy data protection method based on HEVC video steganography[C]//2020 3rd International Conference on Smart BlockChain(SmartBlock). Zhengzhou: IEEE, 2020: 1-6.
|
9 |
SHE W, HUO L J, TIAN Z, et al. A double steganography model combining blockchain and interplanetary file system[J]. Peer-to-Peer Networking and Applications, 2021, 14(5): 3029-3042.
|
10 |
YUAN C, XU M X, SI X M, et al. Blockchain with accountable CP-ABE: How to effectively protect the electronic documents[C]//2017 IEEE 23rd International Conference on Parallel and Distributed Systems(ICPADS). Shenzhen: IEEE, 2017: 800-803.
|
11 |
HU D H, WANG L, JIANG W J, et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018, 6: 38303-38314.
|
12 |
HAYES J, DANEZIS G. Generating steganographic images via adversarial training[EB/OL]. (2017-05-01)[2021-08-01]. .
|
13 |
YANG J H, LIU K, KANG X G, et al. Spatial image steganography based on generative adversarial network[EB/OL]. (2018-04-21)[2021-08-01]. .
|
14 |
LIU J, KE Y, ZHANG Z, et al. Recent advances of image steganography with generative adversarial networks[J]. IEEE Access, 2020, 8: 60575-60597.
|
15 |
SHI H C, DONG J, WANG W, et al. SSGAN: Secure steganography based on generative adversarial networks[C]//Advances in Multimedia Information Processing - PCM 2017. Harbin: Springer, 2018: 534-544.
|
16 |
LI X F, MEI Y R, GONG J, et al. A blockchain privacy protection scheme based on ring signature[J]. IEEE Access, 2020, 8: 76765-76772.
|
17 |
LI X Q, JIANG P, CHEN T, et al. A survey on the security of blockchain systems[J]. Future Generation Computer Systems, 2020, 107: 841-853.
|
18 |
GAO W C, HATCHER W G, YU W. A survey of blockchain: Techniques, applications, and challenges[C]//2018 27th International Conference on Computer Communication and Networks(ICCCN). Hangzhou: IEEE, 2018: 1-11.
|
19 |
CHEN Y L, LI H, LI K J, et al. An improved P2P file system scheme based on IPFS and Blockchain[C]//2017 IEEE International Conference on Big Data(Big Data). Boston: IEEE, 2017: 2652-2657.
|
20 |
GOODFELLOW I J, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial networks[EB/OL]. (2018-04-21)[2014-06-10]. .
|
21 |
WANG K F, GOU C, DUAN Y J, et al. Generative adversarial networks: Introduction and outlook[J]. IEEE/CAA Journal of Automatica Sinica, 2017, 4(4): 588-598.
|
22 |
DENIS V, IVAN N, EVGENY B. Steganographic generative adversarial networks[C]//Twelfth International Conference on Machine Vision(ICMV 2019). Amsterdam: SPIE, 2020: 1-15.
|
23 |
BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption[C]//2007 IEEE Symposium on Security and Privacy(SP'07). Berkeley: IEEE, 2007: 321-334.
|
24 |
陈露, 相峰, 孙知信.基于属性密码体制的区块链安全技术研究进展[J].电子学报,2021, 49(1): 192-200.
|
|
CHEN L, XIANG F, SUN Z X. A survey of blockchain security technologies based on attribute-based cryptography[J]. Acta Electronica Sinica, 2021, 49(1): 192-200. (in Chineses)
|
25 |
RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[C]//Advances in Cryptology-ASIACRYPT 2001. Gold Coast: Springer, 2001: 552-565.
|
26 |
KARAKUS S, AVCI E. A new image steganography method with optimum pixel similarity for data hiding in medical images[J]. Medical Hypotheses, 2020, 139: 109691.
|