[1] Zhang Q, Liu Y, Nan Y, et al. Classification algorithm of JSteg and F5 Stego-images based on histogram difference[J]. Energy Procedia, 2011, 13:8759-8766. [2] Westfeld A. F5-a steganographic algorithm[C]//International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2001. [3] Huang J W, Shi Y Q. Embedding gray level images[C]//ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems. IEEE, 2001. [4] Fridrich J. Statistically undetectable JPEG steganography:dead ends challenges, and opportunities[C]//Workshop on Multimedia & Security. DBLP, 2007. [5] Sachnev V, Kim H J. An improved matrix encoding scheme for JPEG steganography[C]//International Conference on Digital-forensics & Watermarking. Springer, Berlin, Heidelberg, 2011. [6] Fridrich J, Goljan M, Lisonek P. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10):3932-3935. [7] Filler, T, Judas, J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):920-935. [8] Fridrich J, Kodovský J. Multivariate gaussian model for designing additive distortion for steganography[C]//IEEE International Conference on Acoustics. IEEE, 2013. [9] Fridrich J J, Goljan M, Soukal D. Perturbed quantization steganography with wet paper codes[C]//Proceedings of the 6th workshop on Multimedia & Security. Magdeburg, Germany, 2004. [10] Huang F J, Huang J W, Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(4):1181-1191. [11] Guo L J, Ni J Q, Shi Y Q. Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(5):814-825. [12] Guo L J, Ni J Q, Shi Y Q. An efficient JPEG steganographic scheme using uniform embedding[C]//IEEE International Workshop on Information Forensics and Security, Tenerife, 2012:169-174. [13] Guo L J, Ni J, Su W, et al. Using statistical image model for JPEG steganography:uniform embedding revisited[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(12):2669-2680. [14] 潘琳, 钱振兴, 张新鹏. 基于构造纹理图像的数字隐写[J]. 应用科学学报, 2016, 34(5):625-632. Pan L, Qian Z X, Zhang X P. Steganography by constructing texture images[J]. Journal of Applied Sciences, 2016, 34(5):625-632. (in Chinese) [15] Oosterwijk J J, Skoric B, Doumen J. Optimal suspicion functions for Tardos traitor tracing schemes[C]//ACM Workshop on Information Hiding & Multimedia Security. ACM, 2013:19. |