参考文献
[1] 张 涛, 平西建, 徐长勇. 基于图像平滑度的空域LSB 嵌入的检测算法[J]. 计算机辅助设计与图形学学报, 2006, 18(10): 1607-1612.
[2] Pevny T, Fridrich J. Merging Markov and DCT Features for Multi-class JPEG Steganalysis[C]//Proceedings of SPIE’07. San Jose, USA: [s. n.], 2007: 1-34.
[3] Liu Qing. Steganalysis of DCT-embedding Based Adaptive Steganography and YASS[C]//Proceedings of ACM Multi- media & Security Workshop. [S. 1.]: ACM Press, 2011: 77-86.
[4] Pevny T, Bas P, Fridrich J. Steganalysis by Subtractive Pixel Adjacency Matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215- 224.
[5] 黄方军, 黄继武. 基于图像校准的通用型JPEG隐写分析[J]. 中国科学F辑: 信息科学, 2009, 39(4): 383-390.
[6] Kodovsky J, Fridrich J. Calibration Revisited[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. [S. 1.]: ACM Press, 2009: 63-74.
[7] Shi Yunqing, Xuan Guorong, Yang Chengyun, et al. Effective Seganalysis Based on Statistical Moments of Wavelet Characteristic Function[C]//Proceedings of IEEE International Conference on Information Technology. [S. 1.]: IEEE Press, 2005, 768-773.
[8] Kodovsky J, Fridrich J. Steganalysis in High Dimensions: Fusing Classifiers Built on Random Subspaces[C]// Proceedings of SPIE Electronic Imaging, Watermarking, Security and Forensics of Multimedia XIII. San Francisco, USA: [s. n.], 2011: 1-13. (下转第166页)
(上接第157页)
[9] Kodovsk J, Fridrich J, Pevny T. Statistically Undetectable JPEG Steganography: Dead Ends, Challenges and Opportuni- ties[C]//Proceedings of the 9th ACM Multimedia & Security Workshop. [S. 1.]: ACM Press, 2007: 20-21.
[10] Westfeld A. F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis[C]//Proceedings of the 4th International Workshop on Information Hiding. [S. 1.]: IEEE Press, 2001, 289-302.
[11] Sallee P. Model-based Steganography[C]//Proceedings of International Workshop on Digital Watermarking. Berlin, Germany: Springer-Verlag, 2004: 154-167.
[12] Fridrich J, Goljan M, Soukal D. Perturbed Quantization Steganography Using Wet Paper Codes[C]//Proceedings of the 6th ACM Multimedia & Security Workshop. [S. 1.]: ACM Press, 2004: 4-15.
[13] Fridrich J, Goljan M, Soukal D, et al. Wet Paper Codes with
Improved Embedding Efficiency[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1): 102-110.
[14] Sachnev V, Kim H J. Less Detectable JPEG Steganography Method Based on Heuristic Optimization and BCH Syndrome Coding[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. [S. 1.]: ACM Press, 2009: 131-140.
[15] Schaefer G, Stich M. Uncompressed Colour Image Database v2.03[EB/OL]. (2010-08-16). http://vision.cs.aston.ac.uk/ datasets/ UCID/data/ucid.v2.tar.gz.
[16] Chen Chunhua, Shi Yunqing. JPEG Image Steganalysis Utilizing Both Intrablock and Interblock Correlations[C]// Proceedings of IEEE International Symposium on Circuits and Systems. Seattle, USA: IEEE Press, 2008: 3029-3032.
[17] Fridrich J, Kodovsky J. Rich Models for Steganalysis of Digital Images[D]. New York, USA: Department of Electrical and Computer Engineering, Binghamton University, 2012.
编辑 索书志 |