[1] Sallee P. Model-based steganography—Digital watermarking [M]. Berlin Heidelberg: Springer, 2003: 154-167.
[2] Fridrich J, Pevný T, Kodovský J. Statistically undetectable JPEG steganography: dead ends challenges, and opportunities [C]//Proceedings of the 9th workshop on Multimedia & security. ACM, 2007: 3-14.
[3] Westfeld A. F5-a steganographic algorithm[C]//Information hiding. Springer Berlin Heidelberg, 2001: 289-302.
[4] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain [J]. EURASIP Journal on Information Security, 2014, 2014(1): 1-13.
[5] Guo L, Ni J, Su W. Using statistical image model for JPEG steganography: uniform embedding revisited [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2669-2680.
[6] Guo L, Ni J, Shi Y Q. Uniform embedding for efficient JPEG steganography [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 814-825.
[7] Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm[C]//Information hiding. Springer Berlin Heidelberg, 2002: 310-323.
[8] Kodovský J, Fridrich J. Quantitative steganalysis of LSB embedding in JPEG domain[C]//Proceedings of the 12th ACM workshop on Multimedia and security. ACM, 2010: 187-198.
[9] Kodovský J, Fridrich J. Steganalysis of JPEG images using rich models [C]//Proceeding of the International Society of Optical Engineering, 2012, 8303: 83030A.
[10] Holub V, Fridrich J. Low-complexity features for JPEG steganalysis using undecimated DCT[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 219-228.
[11] Song X, Liu F, Yang C. Steganalysis of adaptive JPEG steganography using 2D Gabor filters[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015: 15-23.
[12] Pevný T, Fridrich J. Novelty detection in blind steganalysis [C]//Proceedings of the 10th ACM workshop on Multimedia and security, 2008: 167-176.
[13] Kodovský J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[14] Kodovský J, Fridrich J. Steganalysis in high dimensions: fusing classifiers built on random subspaces 2011: 78800L-78800L-13. [C]//Proceedings of the International Society for Optical Engineering, 2011, 7880: 7880L.
[15] Zhu M, Martinez A M. Subclass discriminant analysis [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(8): 1274-1286.
[16] Jiang X, Mandal B, Kot A. Eigenfeature regularization and extraction in face recognition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008, 30(3): 383-394.
[17] Cogranne R, Sedighi V, Fridrich J. Is ensemble classifier needed for steganalysis in highdimensional feature spaces? [C]//2015 IEEE International Workshop on Information Forensics and Security, 2015: 1-6. |