[1] ProvosN. Defending against statistical steganalysis [C]//Proceedings of 10th USENIX Security Symp., Aug. 13-17, 2001: 323-335. [2] Westfeld A. High capacity despite better steganalysis (F5-A steganographic algorithm) [C]//Proceedings of Information Hiding, 4th Int. Workshop, ser. Lect. Notes comput. Sci., I. S. Moskowitz, Ed. New York: Springer-Verlag, Apr. 25-27, 2001, 2137: 289-302.[3] Sallee P. Model-based steganography [C]//Proceedings of 2nd Int. Workshop Digital Watermarking, Seoul, Korea, Oct. 20-22, 2003, 2939: 154-167. [4] Sallee P. Model-based methods for steganography and steganalysis [J]. International Journal of Image and Graphics, 2005, 5(1): 167-190.[5] Kodovský J, Fridrich J, Pevný T. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities [C]//Proceedings of 9th ACM Multimedia & Security Workshop, Dallas, TX, Sep.20-21, 2007: 3-14.[6] Pevný T, Fridrich J. Merging Markov and DCT feature for multi-class JPEG steganalysis [C]//Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, Jan. 2007: 1-13.[7] Pevný T, Fridrich J. Multiclass detector of current steganographic methods for JPEG format [J]. IEEE Trans. Inf. Forensics Security, 2008, 3(4): 635-650.[8] Fu Dongdong, Shi Yunqing, Su Wei. A generalized Benford’s law for JPEG coefficients and its applications in image forensics [C]//Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, USA, Jan. 2007.[9] Fridrich J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes [C]// Proceedings of 6th Int. Workshop Information Hiding, LNCS 3200, 2004: 67-81.[10] The USDA NRCS photo gallery [DB/OL]. (2008-9-14) [2009-10-12]. http://photogallery.nrcs.usda.gov/.[11] Xia Zhihua, Sun Xingming, Liang Wei, Qin Jiaohua, Li Feng. JPEG image steganalysis using joint discrete cosine transform domain features [J]. Journal of Electronic Imaging, 2010, 19 (2): 1-13. |