[1] Westfeld A. F5a steganographic algorithm: high capacity despite better steganalysis [C]// Proceedings of the 4th International Workshop on Information Hiding, Pittsburgh 2001: 289-302.
[2] Provos N. Defending against statistical steganalysis [C]//Proceedings of the 10th USENIXSecurity Symposium. Washington DC 2001: 323-336.
[3] Sallee P. Model-based steganography [C]. Proceedings of International Workshop on Digital Watermarking. Springer-Verlag, LNCS 2939, 2004: 154-167.
[4] Fridrich J, PevnÝ T, KodovskÝ J. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities [C]//Proceedings of the 9th ACM Multimedia & Security Workshop. Texas, 2007: 3-14.
[5] Solanki K, Sarkar A, Manjunath B S. YASS: yet another steganographic scheme that resists blind steganalysis [C]//Proceedings of the 9th International Workshop on Information Hiding. Berlin, 2007: 16-31.
[6] Chen C, Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]//IEEE International Workshop on Circuits and Systems, 2008: 3029-3032.
[7] KodovskÝ J, Fridrich J. Calibration revisited [C]//Proceedings of the 11th ACM Multimedia & Security Workshop. New Jersey, 2009: 63-74.
[8] KodovskÝ J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.
[9] Liu Q, Sung A H, Qiao M. Improved detection and evaluation for JPEG steganalysis [C]// Proceedings of the 17th ACM international conference on Multimedia. BeiJing, 2009: 873-876.
[10] Liu Q, Sung A H, Qiao M. Neighboring joint density-based JPEG steganalysis [J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(2): 16.
[11] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS [C]// Proceedings of the 13th ACM Multimedia & Security Workshop. New York, 2011: 77-86.
[12] Gul G, Kurugollu F. JPEG image steganalysis using multivariate PDF estimates with MRF cliques [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3): 578-587.
[13] Holub V, Fridrich J. Low complexity features for jpeg steganalysis using undecimated DCT [J]. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 219-228. |