参考文献
[1]Cheddad A,Condell J,Curran K,et al.Digital Image Steganography:Survey and Analyses of Current Method[J].Signal Processing,2010,90(3):727-752.
[2]Sallee P.Model-based Methods for Steganography and Steganalysis[J].International Journal of Image Graphic,2005,5(1):167-190.
[3]Fridrich J,Goljan M,Soukal D.Perturbed Quantization Steganography[J].ACM Multimedia and Security Journal,2005,11(2):98-107.
[4]Sajedi H.Adaptive Batch Steganography Considering Image Embedding Capacity[J].Optical Engineering,2009,48(8):87-97.
[5]Kodovsky J,Fridrich J,Holub V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics and Security,2012,7(2):432-444.
[6]Luo Weiqi,Hunag Fangjun,Huang Jiwu.Edge Adaptive Image Steganography Based on LSB Matching Revisited[J].IEEE Transactions on Information Forensics and Security,2010,5(2):201-214.
[7]Filler T,Fridrich J.Gibbs Construction in Stegano-graphy[J].IEEE Transactions on Information Forensics and Security,2010,5(4):705-720.
[8]Kodovsky J,Fridrich J.Steganalysis in High Dimensions:Fusing Classifiers Built on Random Sub-spaces[J].Electronic Imaging Security and Forensics of Multimedia,2011,78(11):1-13.
[9]Li Bin,Shi Yunqing,Huang Jiwu.Steganalysis of YASS[J].IEEE Transactions on Information Forensics and Security,2009,4(3):369-382.
[10]凌轶华,蔡晓霞,陈红.应用DCT块标准差的自适应隐写算法[J].中国图象图形学报,2014,19(3):401-406.
[11]凌轶华,蔡晓霞,陈红.应用共生矩阵特征的改进自适应 JPEG 隐写[J].计算机应用研究,2014,31(28):100-105.
[12]Xiong Gang,Ping Xijjian,Zhang Tao,et al.Image Textural Features for Steganalysis of Spatial Domain Steganography[J].Journal of Electronic Imaging,2012,21(3):33-45.
[13]Kodovsky J,Fridrich J,Holub V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics and Security,2012,7(2):432-444.
[14]程森,张卫民,包震坤,等.基于DCT系数大小关系的自适应JPEG隐写[J].武汉大学学报:理学版,2012,58(6):545-550.
[15]张广斌,岳云天,张传富.基于Hilbert的快速湿纸码自适应隐写算法[J].计算机工程,2013,39(7):161-174.
编辑索书志 |