[1] SALLEE P. Model-basedsteganography[M]. In: Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.[2] CRANDALL R. Some notes on steganography[J]. Posted on Steganography Mailing List, 1998.[3] WESTFELD A. F5—A steganographic algorithm high capacity despite better steganalysis[C]// In: Proceedings of Information Hiding 4th International Workshop. Springer-Verlag, LNCS 2137, 2001: 289-302.[4] KIM Y, DURIC Z, RICHARDS D. Modified matrix encoding technique for minimal distortion steganography[C]//In: Proceedings of 6th International Workshop on Information Hiding. Springer-Verlag, LNCS 4437, 2006: 314-327.[5] FRIDRICH J, GOLJAN M, LISONEK P, SOUKAL D. Writing on wet paper[J]. IEEE Transactions on Signal Processing,Special Issue on Media Security.2004, 54(10): 3923-3935.[6] FRIDRICH J, PEVNY T, KODOVSKY J. Statistically undetectableJPEG steganography: dead ends, challenges, and opportunities[C]//In: Proceedings of the 9th ACM Workshop on Multimedia & Security. New York: ACM Press, 2007: 3-14.[7] FILLER T, JUDAS J, FRIDRICH J. Minimizing embedding impact in steganography using trellis-coded quantization[C]//In: Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII. San Jose, CA, 2010, 7541(5): 1-14.[8] SACHNEV V, KIM H, ZHANG R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]//In: Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 131-139.[9] GUO L J, NI J Q, SHI Y Q.Uniform embedding for efficient JPEG steganography[J].IEEE Transactions on Information Forensics and Security. 2014, 9(5): 814-825.[10] GUO L J, NI J Q, SHI Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012: 169 – 174.[11] FILLER T, FRIDRICH J. Design of adaptive steganographic schemes for digital images[C]// In: Proceedings of SPIE Electronic Imaging, Media Watermarking, Security, and Forensics XIII. Bellingham: SPIE Press, 2011, 7880: 1-14.[12] FILLER T, PENVY T, BAS P. BOSS (Break our steganography system)[J]. 2010.[13] PEVNY T, FRIDRICH J. Merging markov and DCT features for multi-class JPEG steganalysis[C]//In: Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. Bellingham, Wash, 2007: 1-13.[14] KODOVSKY J, FRIDRICH J. Calibration revisited[C]// In: Proceedings of 11th ACM Multimedia &Security Workshop. Princeton, New Jersey, USA, 2009: 63-74.[15] KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble classifier for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.[16] KODOVSKY J, FRIDRICH J. Steganalysis of JPEG images using rich models[C]// In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, San Francisco, CA, January 22-26, 2012. |