1 code implementation • 27 Feb 2024 • Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang
It is also shown to be capable of imperceptibly carrying the steganographic networks in a purified network.
no code implementations • 18 Sep 2023 • Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang
To deal with this issue, we propose a key-based FNNS scheme to improve the security of the FNNS, where we generate key-controlled perturbations from the FNN for data embedding.