|   [1] Mielikainen J. LSB matching revisited [J]. IEEE on Signal Processing Letters, 2006, 13(5): 285-287. 
[2] Omoomi M, Samavi S, Dumitrescu S. An efficient high payload±1 data embedding scheme[J]. Multimedia Tools and Applications, 2011, 54(2): 201-218. 
[3] Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Communications Letters, 2006, 10(11): 781-783. 
[4] Chao R, Wu H, Lee C. A novel image datahiding scheme with diamond encoding [J]. Eurasip Journal on Information Security, 2009, 2009(1): 1-9. 
[5] Hong W, Chen T. A novel data embedding method using adaptive pixel pair matching [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 176-184. 
[6] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214. 
[7] Cachin C. An information-theoretic model for steganography [J]. Information and Computation, 2004, 192(1): 41-56. 
[8] Aucsmith D. Information hiding [M]. Berlin Heidelberg: Springer, 1998: 306-318. 
[9] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882. 
[10] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224. 
[11] Holub V, Fridrich J. Random projections of residuals for digital image steganalysis [J]. IEEE Transactions on Information Forensics and Security,2013, 8(12): 1996-2006. 
[12] Schaefer G, Stich M. UCID: an uncompressed color image database [C]//Proceedingof the Storage and Retrieval Methods and Applications for Multimedia. CA: San Jose, 2004: 472-480. 
[13] United States Department of Agriculture. Natural resources conservation service photo gallery.[OL]. Available: http://photogallery.nrcs.usda.gov. 
[14] 师夏阳,马赛兰,胡永健,周琳娜. 一种基于像素块的纹理优先自适应隐写算法[J]. 电子学报,2015, 43(6): 1094-1100. Shi X Y, Ma S L, Hu Y J, Zhou L N. A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures [J]. Chinese Journal of Electronics, 2015, 43(6): 1094-1100. (in Chinese) 
[15] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline fitting [J]. IEEE Signal Processing Letters, 2012, 19(6): 336-339. 
[16] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. 
[17] Gul G, Kurugollu F. A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO) [C]//International Conference on Information Hiding, Springer-Verlag, 2011, 6958: 71-84. 
[18] Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]//IEEE International Workshop on Information Forensic and Security, 2012: 234-239. 
[19] Holub V, Fridrich J. Digital image steganography using universal distortion [C]//ACM Workshop on Information Hiding and Multimedia Security, 2013: 59-68. 
[20] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography [C]//IEEE International Conference on Image Processing, 2014: 4206-4210.  |