[1] PETITCOLAS F A P, ANDERSON R J, KUHN M G. Information hiding-A survey [J]. Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, 1999,87(7):1062-1078.[2] WESTFELD A, PFITZMANN A. Attacks on steganographic systems [C]// Third International Workshop on Information Hiding, Lecture Notes in Computer Science ,2000,1768: 61-76.[3] FRIDRICH J, GOLJAN M, RUI D. Reliable detection of LSB steganography in color and grayscale images [C]// International Multimedia Conference on Multimedia and security: new challenges 2001: 27-30.[4] ZHANG Tao, PING Xijian. A new approach to reliable detection of LSB steganography in natural image [J]. Signal Process, 2003, 83(10): 2085-2093.[5] QUACH T T. On locating steganographic payload using residuals[J]. SPIE Media Watermarking, Security, and Forensics III, 2011,7880: 78800J1-7.[6] DAVIDSON I, PAUL G. Locating Secret Messages in Images[C]// Tenth ACM SIGKDD international conference on Knowledge discovery and data mining ,2004:545-550.[7] AGAIAN S S, BENJAMIN M R, Glenn B D. Steganalysis using modified pixel comparison and complexity measure[J]. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, 2004, 5306.[8] KONG Xiangwei, LIU Wenfeng, YOU Xingang. Secret message location steganalysis based on local coherences of hue[M]. Advances in Multimedia Information Processing-PCM 2005, 2005, 3768: 301-311.[9] KER A D. Locating steganographic payload via WS residuals[C]// the 10th ACM Workshop on Multimedia and Security, 2008:27-32.[10] FRIDRICH J,GOLJAN M. On estimation of secret message length in LSB steganography in spatial domain[J]. SPIE Security, Steganography, and Watermarking of Multimedia Contents VI,2004, 5306:23-34.[11] KER A D,LUBENKO I. Feature reduction and payload location with WAM steganalysis[J]. SPIE Media Forensics and Security XI, 2009, 7254:0A01-0A13.[12] YI Luo, LI Xiaolong, Yang Bin. Locating steganographic payload for LSB matching embedding[C]// IEEE International Conference on Multimedia and Expo (ICME), 2011, 1-6.[13] QUACH T T. Optimal cover estimation methods and steganographic payload location[J]. IEEE International Conference on information Forensics and Security, 2011, 6(4): 1214-1222.[14] QUACH T T. Locating payload embedded by group-parity steganography[J]. Digital Investigation, 2012, 9(2):160-166.[15] KER A D, BÖHME R. Revisiting weighted stego-image steganalysis[C]// SPIE Security,Forensics,Steganography and Watermarking of Multimedia Contents X, 2008, 6819:05-16. |