[1] Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287.
[2] Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218.
[3] Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783.
[4] Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9.
[5] Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184.
[6] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214.
[7] Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56.
[8] Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318.
[9] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
[10] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
[11] Holub V, Fridrich J. Random projections of residuals for digital image steganalysis [J]. IEEE Transactions on Information Forensics and Security,2013, 8(12): 1996-2006.
[12] Schaefer G, Stich M. UCID: an uncompressed color image database [C]//Proceedingof the Storage and Retrieval Methods and Applications for Multimedia. CA: San Jose, 2004: 472-480.
[13] United States Department of Agriculture. Natural resources conservation service photo gallery.[OL]. Available: http://photogallery.nrcs.usda.gov.
[14] 师夏阳,马赛兰,胡永健,周琳娜. 一种基于像素块的纹理优先自适应隐写算法[J]. 电子学报,2015, 43(6): 1094-1100. Shi X Y, Ma S L, Hu Y J, Zhou L N. A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures [J]. Chinese Journal of Electronics, 2015, 43(6): 1094-1100. (in Chinese)
[15] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline fitting [J]. IEEE Signal Processing Letters, 2012, 19(6): 336-339.
[16] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[17] Gul G, Kurugollu F. A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO) [C]//International Conference on Information Hiding, Springer-Verlag, 2011, 6958: 71-84.
[18] Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]//IEEE International Workshop on Information Forensic and Security, 2012: 234-239.
[19] Holub V, Fridrich J. Digital image steganography using universal distortion [C]//ACM Workshop on Information Hiding and Multimedia Security, 2013: 59-68.
[20] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography [C]//IEEE International Conference on Image Processing, 2014: 4206-4210. |