Encrypted rich-data steganography using generative adversarial networks.
Dule ShuWeilin CongJiaming ChaiConrad S. TuckerPublished in: WiseML@WiSec (2020)
Keyphrases
- data sets
- image data
- training data
- computer systems
- high quality
- data analysis
- database
- data mining techniques
- data collection
- statistical analysis
- synthetic data
- prior knowledge
- network structure
- data sources
- knowledge discovery
- raw data
- sensor networks
- data quality
- original data
- social networks
- data points
- neural network