[1] 王朔中, 张新鹏, 张卫明. 以数字图像为载体的隐写分析研究进展[J]. 计算机学报, 2009, 32(7): 1247-1263. [2] Li Bin, He Junhui, Huang Jiwu. A Survey on Image Steganography and Steganalysis[J]. Journal of Information Hiding and Multimedia Signal Processing, 2011, 2(2): 142-171. [3] Westfeld A, Pfitzmann A. Attacks on Steganographic Systems[C]//Proc. of the 3rd Information Hiding Workshop. Dresden, Germany: Springer-Verlag, 1999. [4] Fridrich J, Goljan M, Du Rui. Detecting LSB Steganography in Color and Gray-scale Images[J]. IEEE Multimedia, 2001, 8(4): 22-28. [5] Dumitrescu S, Wu Xiaolin, Wang Zhe. Detection of LSB Steganography via Sample Pair Analysis[C]//Proc. of the 5th Information Hiding Workshop. Noordwijkerhout, the Netherlands: Springer-Verlag, 2002: 355-372. [6] Ker A D. A General Framework for the Structural Steganalysis of LSB Replacement[C]//Proc. of the 7th Information Hiding Workshop. Barcelona, Spain: Springer-Verlag, 2005: 296-311. [7] Fridrich J, Goljan M. On Estimation of Secret Message Length in LSB Steganography in Spatial Domain[C]//Proc. of SPIE’04. San Jose, USA: [s. n.], 2004: 23-34. [8] Westfeld A. Detecting Low Embedding Rates[C]//Proc. of the 5th Information Hiding Workshop. Noordwijkerhout, the Netherlands: Springer-Verlag, 2002: 324-339. [9] Harmsen J, Pearlman W. Steganalysis of Additive Noise Modelable Information Hiding[C]//Proc. of SPIE’03. Santa Clara, USA: [s. n.], 2003: 131-142. [10] Ker A D. Steganalysis of LSB Matching in Grayscale Images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444. [11] Zhang Jun, Cox I J, Doerr G. Steganalysis for LSB Matching in Images with High-frequency Noise[C]//Proc. of IEEE Workshop on Multimedia Signal Processing. Chania, Greece: IEEE Press, 2007: 385-388. [12] Cancelli G, Doerr G., Cox I, et al. Detection of +/-1 Steganography Based on the Amplitude of Histogram Local Extrema[C]//Proc. of IEEE International Conference on Image Processing. San Diego, USA: IEEE Press, 2008. [13] Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG Image: Breaking the F5 Algorithm[C]//Proc. of the 5th Information Hiding Workshop. Noordwijkerhout, the Netherlands: Springer-Verlag, 2002: 310-323. [14] Fridrich J, Goljan M, Hogea D. Attacking the Outguess[C]//Proc. of 2002 Workshop on Multimedia and Security. Juan-les-Pins, France: ACM Press, 2002: 3-6. [15] ?ohme R B, Westfeld A. Breaking Cauchy Model-based JPEG Steganography with First Order Statistics[C]//Proc. of the 9th European Symposium on Research in Computer Security. Sophia Antipolis, France: Springer-Verlag, 2004. [16] Li Bin, Huang Jiwu, Shi Yun. Steganalysis of Yass[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 369-382. [17] Avcibas I, Memon N, Sankur B. Steganalysis Using Image Quality Metrics[J]. IEEE Transactions on Image Processing, 2003, 12(2): 221-229. [18] Farid H. Detecting Hidden Messages Using Higher Order Statistical Models[C]//Proc. of the 5th International Conference on Image Processing. Rochester, USA: IEEE Press, 2002: 905-908. [19] Xuan Guorong, Shi Yunqing, Gao Jianjiong, et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Func- tions[C]//Proc. of the 7th Information Hiding Workshop. Barcelona, Spain: Springer-Verlag, 2005. [20] Liu Zugen, Ping Lingdi, Chen Jian. Steganalysis Based on Differential Statistics[C]//Proc. of the 5th International Conference on Cryptology and Network Security. Suzhou, China: Springer-Verlag, 2006: 224-240. [21] Holotyak T, Fridrich J, Voloshynovskiy S. Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics[C]//Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security. Salzburg, Austria: Springer-Verlag, 2005. [22] Goljan M, Fridrich J, Holotyak T. New Blind Steganalysis and its Implications[C]//Proc. of SPIE’06. San Jose, USA: [s. n.], 2006: 1-13. [23] Zhang Jun, Zhang Dan. Detection of LSB Matching Steganography in Decompressed Images[J]. IEEE Signal Processing Letters, 2010, 17(2): 141-144. [24] Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis for Markov Cover Data with Application to Images[J]. IEEE Transactions on Information Security and Forensics, 2006, 1(2): 275-287. [25] Chen Chunhua, Shi Yunqing, Chen Wen, et al. JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain[C]//Proc. of MMSP’06. Shanghai, China: [s. n.], 2006: 310-313. (下转第172页)[26] Shi Yunqing, Chen Chunhua, Chen Wen. A Morkov Process-based Approach to Effective Attacking JPEG Steganography[C]//Proc. of the 8th Information Hiding Workshop. Alexandria, USA: Springer-Verlag, 2006. [27] Xuan Guorong, Shi Yunqing, Huang Cong, et al. Steganalysis Using High-dimensional Features Derived from Co-occurrence Matrix and Class-wise Non-principal Components Analysis[C]//Proc. of International Workshop on Digital Watermarking. Jeju Island, Korea: Springer- Verlag, 2006: 49-60. [28] Pevny T, Bas P, Fridrich J. Steganalysis by Subtractive Pixel Adjacency Matrix[J]. IEEE Transactions on Information Security and Forensics, 2010, 5(2): 215-224. [29] Fridrich J, Kodovsky J, Holub V, et al. Steganalysis of Content-adaptive Steganography in Spatial Domain[C]// Proc. of the 13th Information Hiding Conference. Prague, Czech Republic: Springer-Verlag, 2011: 102-117. [30] Kodovsky J, Pevny T, Fridrich J. Modern Steganalysis Can Detect YASS[C]//Proc. of Conf. on Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2010. [31] Kodovsky J, Fridrich J. Steganalysis of JPEG Images Using Rich Models[C]//Proc. of Conf. on Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, USA: SPIE, 2012. [32] Bohme R, Ker A D. A Two Factor Error Model for Quantitative Steganalysis[C]//Proc. of Conf. on Security, Steganography, and Watermarking of Multimedia Contents. San Jose, USA: SPIE, 2006. [33] Cancelli G., Doerr G., Cox I, et al. A Comparative Study of +/-1 Steganalyzers[C]//Proc. of International Workshop on Multimedia Signal Processing. Queensland, Australia: IEEE Press, 2008: 791-796. [34] Lyu S, Farid H. Steganalysis Using Color Wavelet Statisticsand One-class Vector Support Machines[C]//Proc. of Conf. on Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2004. [35] Barni M, Cancelli G, Esposito A. Forensics Aided Steganalysis of Heterogeneous Images[C]//Proc. of ICASSP’10. Dallas, USA: IEEE Press, 2010. 编辑 张 帆
|