参考文献
[1] Petitcolas P, Anderson J, Kuhn G. Information Hiding——A Survey[J]. Proceedings of the IEEE, 1999, 87(7): 1062-1078.
[2] Sharp T. An Implementation of Key-based Digital Signal Steganography[C]//Proc. of the 4th Information Hiding Workshop. Berlin, Germany: Springer-Verlag, 2001: 13-26.
[3] Wu D, Tsai W. A Steganographic Method for Images by Pixel-value Differencing[J]. Pattern Recognition Letters, 2003, 24(9-10): 1613-1626.
[4] Kawaguchi E, Eason R O. Principle and Applications of BPCS Steganography[J]. Multimedia Systems and Applications, 1999, 3528(1): 464-473.
[5] Cheng Hsing-Yang, Chi Yao-Weng. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497.
(下转第156页
(上接第151页)
[6] Upham D. JPEG-JSteg-V4[EB/OL]. (2007-06-01). http://www. funet.fi/pub/crypt/steganography/jpeg-JSteg-v4.diff.gz.
[7] Westfeld A. F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis[C]//Proc. of the 4th International Workshop on Information Hiding. New York, USA: [s. n.], 2001: 289-302.
[8] Sallee P. Model-based Steganography[C]//Proc. of the 2nd International Workshop on Digital Watermarking. New York, USA: Springer-Verlag, 2003: 154-167.
[9] Sallee P. Model-based Methods for Steganography and Steg- analysis[J]. International Journal of Image and Graphics, 2005, 5(1): 167-189.
[10] Kovovsky J, Fridrich J, Pevny T. Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities[C]//Proc. of the 9th ACM Multimedia & Security Workshop. Dallas, USA: [s. n.], 2007: 3-14.
[11] Li Bin, Huang Jiwu, Shi Yunqing. Textural Features Based Universal Steganalysis[C]//Proc. of SPIE Security, Forensics, Steganography and Watermarking of Multimedia Contents X. [S. l.]: IEEE Press, 2008.
[12] Pevny T, Bas P, Fridrich J. Steganalysis by Subtractive Pixel Adjacency Matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
[13] Kharrazi M, Sencar H, Memon N. Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganograohy[M]//Shi Y Q. Transactions on Data Hiding and Multimedia Security. Berlin, Germany: Springer-Verlag, 2006: 123-137.
[14] 邓诗智, 刘九芬, 张卫明, 等. 基于多种检测算法的隐写分析方法[J]. 计算机工程, 2008, 34(8): 150-152.
[15] Bishop C M. Pattern Recognition and Machine Learning[M]. New York, USA: Springer, 1995.
[16] Chang Chih-Chung, Lin Chih-Jen. LIBSVM: A Library for Support Vector Machines[EB/OL]. (2010-05-14). http://www. csie.ntu.edu.tw/~cjlin/libsvm.
[17] Doёrr G. Image Database for Steganalysis Studies[EB/OL]. (2011-05-17). http://www.cs.ucl.ac.uk/staff/I.Cox/Content/Do- wnloads.html.
编辑 陆燕菲 |