[1] Pevný T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Proceedings of SPIE, 2007, 6505:650503.
[2] Kodovský J, Feideich J. Calibration revisited[C]//Proceedings of ACM Workshop Multimedia and Security. Princeton, New Jersey, 2009:63-74.
[3] Pevný T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transaction on Information Forensics and Security, 2010, 5(2):215-224.
[4] Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS[C]//Proceedings of 13th ACM Multimedia & Security Workshop. New York, ACM, 2011:77-86.
[5] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications[C]//Proceedings of SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia. San Jose, CA, 2006:1-13.
[6] Wang Y, Moulin P. Optimized feature extraction for learning based image steganalysis[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(1):31-45.
[7] Kodovský J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transaction on Information Forensics and Security, 2012, 7(2):432-444.
[8] Kodovský J, Fridrich J. Steganalysis of JPEG images using rich models[C]//Proceedings of SPIE, 2012, 8303:83030A.
[9] Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to cooccurrences in steganalysis[C]//Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA, 2013:3-7.
[10] Cho S, Cha B, Gawecki M, Kuo C. Block-based image steganalysis:algorithm and performance evaluation[J]. Journal of Visual Communication and Image Representation, 2013, 24(7):846-856.
[11] Wang R, Xu M, Ping X, Zhang T. Steganalysis of JPEG images by block texture based segmentation[J]. Multimedia Tools Application, 2015, 74(15):5725-5746.
[12] 汪然,许漫坤,平西建,张涛. 基于分割的空域图像隐写分析[J]. 自动化学报,2014, 40(12):2936-2943. Wang R, Xu M K, Ping X J, Zhang T. Steganalysis of spatial images based on segmentation[J]. Acta Automatica Sinica, 2014, 40(12):2936-2943. (in Chinese)
[13] Fisher R A. The use of multiple measurements in taxonomic problems[J]. Annals of Eugenics, 1936, 7(2):179-188.
[14] Filler T, Pevný T, Bas P. BOSS[EB/OL].[2007-07-01]. http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/.
[15] Bas P, Furon T. Bows-2[EB/OL].[2007-07-01]. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz.
[16] Goljan M, Fridrich J, Holotyak T. The USDA NRCS Photo Gallery[EB/OL].[2008-09-14]. http://photogallery.nrcs.usda.gov.
[17] Schaefer G, Stich M. UCID-an uncompressed colour image database[R]. UK:Nottingham Trent University, 2003.
[18] Fridrich J, Pevný T, Kodovský J. Statistically undetectable JPEG steganography:dead ends, challenges, and opportunities[C]//Proceedings of ACM Multimedia and Security Workshop. Texas, 2007:3-14.
[19] Westfeld A. High capacity despite better steganalysis (F5-a steganographic algorithm)[C]//Proceedings of 4th International Workshop on Information Hiding. Pittsburgh, PA, 2001:289-302.
[20] Sallee P. Model-based steganography[C]//Proceedings of International Workshop on Digital Watermarking. Seoul, Korea, 2003:154-167.
[21] Kim Y, Duric Z, Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of International Workshop on Information Hiding. Heidelberg, 2007:314-327. |