[1] KER A. Steganalysis of LSB matching in grayscale images [J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.[2] CANCELLI G, DOËRR G, BARNI M, Ingemar J. COX I J. A comparative study of ±1 steganalyzers [C]//IEEE Workshop on Multimedia Signal Processing, 2008:791-796.[3] 郭艳卿,何德全,尤新刚,孔祥维,王波. 基于整体性的隐密分析特征提取和融合方法研究 [J].电子学报,2006, 34 (12A): 2443-2446.GUO Yanqing, HE Dequan,YOU Xingang, KONG Xiangwei, WANG Bo. Research on holism-based feature extraction and fusion for steganalysis [J]. Acta Electronica Sinica, 2006, 34 (12A): 2443-2446.[4] 钮心忻,杨义先. 信息隐写与隐写分析研究框架探讨 [J]. 电子学报,2006, 34(12A): 2421-2424.NIU Xinxin,YANG Yixian. Study on the frame of information steganography and steganalysis [J]. Acta Electronica Sinica, 2006, 34(12A): 2421-2424.[5] LIU Q, SUNG A H, RIBEIRO B, WEI M , CHEN Z , XU J. Image complexity and feature mining for steganalysis of least significant bit matching steganography [J]. Information Sciences, 2008, 178(1): 21-36.[6] CHO S, CHA B H, WANG JINGWEI, JAY K. Block-based image steganalysis: algorithm and performance evaluation [C]//IEEE International Symposium on Circuits and Systems, 2010: 1679-1682.[7] WONG Ping Wah, CHEN Hong, TANG Zhong Jue. On steganalysis of plus-minus one embedding of continuous tone images [C]//Proceedings of SPIE-IS&T Electronic Imaging, 2005, 5681: 643-652.[8] HARMSEN J, PEARLMAN W A. Steganalysis of additive noise modelable information hiding [C]//SPIE International Conference on Security, Steganography, and Wartermarking of Multimedia Contents, 2003: 131-142.[9] ZHANG J, COX I J, DOЁRR G. Steganalysis for LSB matching in images with high-frequency noise [C]//IEEE Workshop on Multimedia Signal Processing, 2007: 385-388.[10] FRIDRICH J, KODOVSKÝ J, HOLUB V, GOLJAN M. Steganalysis of content-adaptive steganography in spatial domain [C]//Information Hiding 13th International Conference, 2011, 6958: 102-117.[11] JACOBS E W, FISHER Y, BOSS R D.Image compression:a study of the iterated transformation method [J]. Signal Process, 1992, 29: 页码。 [12] WANG Ying, PIERRE M. Optimized feature extraction for learning-based image steganalysis [J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1): 31-45.[13] 高建炯,宣国荣,施云庆,柴佩琪,杨志强. 基于直方图频域统计矩的图像隐写分析 [J]. 计算机应用,2005, 25(10): 2371-2373.GAO Jianjiong, XUAN Guorong, SHI Yunqing, CAI Peiqi, YANG Zhiqiang. Image steganalysis based on statistical moments in the frequency domain of the histogram [J]. Computer Applications, 2005, 25(10): 2371-2373. ( in Chinese)[14] DONG Jing, TAN Tieniu. Blind image steganalysis based on run-length histogram analysis [C]//IEEE International Conference on Image Processing, 2008: 2064-2067.[15] YU Xiao Yi, BABAGUHCI N. Run length based steganalysis for LSB matching steganography [C]//International Conference on Multimedia and Expo, 2008: 353-356.[16] DOЁRR G. Image database for steganalysis studies [DB/OL]. Available: http://www.cs.ucl.ac.uk/staff /I.Cox/Content/Downloads.html.[17] CHANG C C, LIN C J. LIBSVM: a library for support vector machines [OL]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm.[18] BAS P, FURON T. BOWS-2 Jul. 2007 [DB/OL]. Available: http://bows2.gipsa-lab.inpg.fr[19] LUO Weiqi, HUANG Fangjun, HUANG Jiwu. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions Information Forensics and Security, 2010, 5( 2): 201-214.[20] PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3 ): 215-224.[21] FRIDRICH J.Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes [C]//Proceedings of 6th Information Hiding Workshop. 2004. Springer LNCS, 3200: 67-81. |