参考文献 [ 1 ] 王朔中,张新鹏. 数字密写和密写分析———互联网时代的信息战技术[M]. 北京:清华大学出版社,2005. [ 2 ] Kodovsky J,Fridrich J. Steganalysis in High Dimensions: Fusing Classifiers Built on Random Subspaces[ C]/ / Proceedings of IS&T/ SPIE’11. San Francisco, USA:IEEE Press,2011:1-13. [ 3 ] Pevny T, Bas P. Steganalysis by Subtractive Pixel Adjacency Matrix [ J ]. IEEE Transactions on Information Forensics and Security,2010,5(2):215-224. [ 4 ] Kodovsky J,Pevny T, Fridrich J. Modern Steganalysis Can Detect YASS[C] / / Proceedings of IS&T / SPIE’10. San Francisco,USA:IEEE Press,2010:1-11. [ 5 ] Fridrich J, Kodovsky J, Holub V, et al. Steganalysis of Content-adaptive Steganography in Spatial Domain[ C]/ / Proceedings of Information Hiding Conference. Berlin,Germany:Springer,2011:102-117. [ 6 ] Vapnik V N. The Nature of Statistical Learning Theory[M]. 2nd ed. Berlin,Germany:Springer-Verlag,2000. [ 7 ] Turk M,Pentland A. Eigenfaces for Recognition [ J]. Journal of Cognitive Neuroscience,1991,3(1):71-86. [ 8 ] 汪廷华,田盛丰,黄厚宽. 特征加权支持向量机[J]. 电子与信息学报,2009,31(3):514-518. [ 9 ] Garc?a-Pedrajas N. Boosting Random Subspace Method[J]. Neural Networks,2008,21(9):1344-1362. [10] Penttinen I J, Stoyan H A. Statistical Analysis and Modelling of Spatial Point Patterns ’ [ M ]. [ S. 1. ]: John Wiley & Sons,2008. [11] Fridrich J, Kodovsky J, Holub V, et al. Breaking HUGO———The Process Discovery[C] / / Proceedings of Information Hiding Conference. Berlin, Germany: Springer,2011:85-101. [12] Pearson K,Blakeman J. Mathematical Contributions to the Theory of Evolution[J]. Philosophical Transactions of the Royal Society of London,1912,187:253-318. [13] 汪海涛,张 卓,杨晓元,等. 基于优化特征加权支持向量机的隐写分析方法[J]. 计算机应用研究,2013, 30(7):2105-2107. [14] Bas P, Filler T, Pevny T. Break Our Steganographic System:The Ins and Outs of Organizing BOSS [C] / / Proceedings of Information Hiding Conference. Berlin, Germany:Springer,2011:59-70. [15] Fridrich J,Kodovsky J. Rich Models for Steganalysis of Digital Images [ J]. IEEE Transactions on Information Forensics and Security,2012,7(3):868-882. 编辑 索书志 |