[1] Li B, Tan S, Wang M, Huang J W. Investigation on cost assignment in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8):1264-1277. [2] Zhang X P. Behavior steganography in social network[C]//International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016:21-23. [3] Wang Z C, Zhang X P, Yin Z X. Hybrid distortion function for JPEG steganography[J]. Journal of Electronic Imaging, 2016, 25(5):050501. [4] Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11):781-783 [5] Zhang X P, Zhang W M, Wang S Z. Efficient double-layered steganographic embedding[J]. Electronics Letters, 2007, 43(8):482-483. [6] Zhang W M, Zhang X P, Wang S Z. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes[C]//International Workshop on Information Hiding, 2008:60-71. [7] Fridrich J, Soukal D. Matrix embedding for large payloads[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(3):390-395. [8] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935. [9] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding, 2010:161-177. [10] Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2012:234-239. [11] Holub V, Fridrich J. Digital image steganography using universal distortion[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. ACM, 2013:59-68. [12] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing. IEEE, 2014:4206-4210. [13] Sedighi V, Fridrich J, Cogranne R. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Media Watermarking, Security, and Forensics 2015. International Society for Optics and Photonics, 2015, 9409:94090H. [14] Wang Z, Lü J, Wei Q, Zhang X P. Distortion function for spatial image steganography based on the polarity of embedding change[C]//International Workshop on Digital Watermarking, 2016:487-493. [15] Wei Y, Zhang W M, Li W, Yu N H. Which gray level should be given the smallest cost for adaptive steganography?[J]. Multimedia Tools and Applications, 2017:1-14. [16] Bas P, Filler T, Pevny T. "Break our steganographic system":the ins and outs of organizing BOSS[C]//International Workshop on Information Hiding, 2011:59-70. [17] Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):215-224. [18] Fridrich J, KodovskY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882. [19] Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):432-444. [20] Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):705-720. [21] Li B, Wang M, Li X, Tan S Q, Huang J W. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1905-1917. [22] Denemark T, Fridrich J. Improving steganographic security by synchronizing the selection channel[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015:5-14. |