[1] Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009.
[2] Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
[3] Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13.
[4] Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395.
[5] Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
[6] Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270.
[7] Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154.
[8] Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569.
[9] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14.
[10] Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4.
[11] Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography [C]//Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 2007, 4437: 249-264.
[12] Lyu S W, Farid H. Steganalysis using higher-order image statistics [J]. IEEE Transactions Information Forensics and Security, 2006, 1(1): 111-119.
[13] Bas P P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions Information Forensics and Security, 2010, 5(2): 215-224.
[14] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions Information Forensics and Security, 2012, 7(3): 868-882.
[15] Otori H, Kuriyama S. Data-embeddable texture synthesis [C]//Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007: 146-157.
[16] Otori H, Kuriyama S. Texture synthesis for mobile data communications [J]. IEEE Conference Graphics Applications, 2009, 29(6): 74-81.
[17] Wu K C, Wang C M. Steganography using reversible texture synthesis [J]. IEEE Transactions Image Proceedings, 2015, 24(1): 130-139.
[18] Xu J, Mao X, Jin X. Hidden message in a deformation-based texture [J]. Visual Computer, 2015, 31: 1653-1669. |