[1] 张卫明, 王宏霞, 李斌, 等. 多媒体隐写研究进展[J]. 中国图象图形学报, 2022, 27(6): 1918-1943.
[2] CHAN C K, CHENG L M. Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004, 37(3): 469-474.
[3] TAMIMI A A, ABDALLA A M, AL-ALLAF O. Hiding an image inside another image using variable-rate steganography[J]. International Journal of Advanced Computer Science and Applications, 2013, 4(10): 18-21.
[4] GUPTA S, GUJRAL G, AGGARWAL N. Enhanced least significant bit algorithm for image steganography[J]. International Journal of Computational Engineering & Management, 2012, 15(4): 40-42.
[5] KHEDMATI Y, PARVAZ R, BEHROO Y. 2D Hybrid chaos map for image security transform based on framelet and cellular automata[J]. Information Sciences, 2020, 512: 855-879.
[6] JAMAL S S, FARWA S, ALKHALDI A H, et al. A robust steganographic technique based on improved chaotic-range systems[J]. Chinese Journal of Physics, 2019, 61: 301-309.
[7] EMAD E, SAFEY A, REFAAT A, et al. A secure image steganography algorithm based on least significant bit and integer wavelet transform[J]. Journal of Systems Engineering and Electronics, 2018, 29(3): 639-649.
[8] ZHU J R, KAPLAN R, JOHNSON J, et al. HiDDeN: hiding data with deep networks[C]// Lecture Notes in Computer Science. Berlin: Springer, 2018: 682-697.
[9] ur REHMAN A, RAHIM R, NADEEM S. End-to-end trained CNN encoder-decoder networks for image steganography [C]// Lecture Notes in Computer Science. Berlin: Springer, 2019: 723-729.
[10] ZHANG K A, CUESTA-INFANTE A, XU L, et al. SteganoGAN: high capacity image steganography with GANs[Z/OL]. (2019-01-30) [2025-06-27]. https://arxiv.org/abs/1901.03892.
[11] JING J P, DENG X, XU M, et al. HiNet: deep image hiding by invertible network[C]// Proceedings of the IEEE International Conference on Computer Vision. Piscataway: IEEE, 2021: 4713-4722.
[12] LU S P, WANG R, ZHONG T, et al. Large-capacity image steganography based on invertible neural networks[C]// Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2021:10811-10820.
[13] GUAN Z Y, JING J P, DENG X, et al. DeepMIH: deep invertible network for multiple image hiding[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, 45(1): 372-390.
[14] XU Y M, MOU C, HU Y J, et al. Robust invertible image steganography[C]// Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2022: 7865-7874.
[15] YANG H, XU Y T, LIU X H, et al. PRIS: practical robust invertible network for image steganography[J]. Engineering Applications of Artificial Intelligence, 2024, 133: 108419.
[16] 段新涛, 白鹿伟, 徐凯欧, 等. 基于卷积神经网络的轻量高效图像隐写[J]. 应用科学学报, 2025, 43(1): 80-93.
[17] 刘连山, 黄瑜. 基于三通道深度融合技术的图像隐写方法[J]. 信息安全研究, 2025, 11(3): 257-264.
[18] DINH L, KRUEGER D, BENGIO Y. NICE: non-linear independent components estimation[Z/OL]. (2015-04-10) [2025-06-27]. https://arxiv.org/abs/1410.8516.
[19] WOO S, PARK J, LEE J Y, et al. CBAM: convolutional block attention module[C]// Lecture Notes in Computer Science. Berlin: Springer, 2018: 3-19.
[20] HUANG G, LIU Z, PLEISS G, et al. Convolutional networks with dense connectivity[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022, 44(12): 8704-8716.
[21] AGUSTSSON E, TIMOFTE R. NTIRE 2017 challenge on single image super-resolution: dataset and study[C]//2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2017: 1122-1131.
[22] LIN T Y,MAIRE M, BELONGIE S, et al. Microsoft COCO: common objects in context[C]//Lecture Notes in Computer Science. Berlin: Springer, 2014: 740-755.
[23] KINGMA D P, BA J L. Adam: a method for stochastic optimization[Z/OL]. (2017?01?22) [2025?06?27]. https://arxiv.org/abs/1412.6980.
[24] BOROUMAND M, CHEN M, FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(5): 1181-1193.