参考文献
[1]PEVN T,FRIDRICH J.Novelty Detection in Blind Steganalysis[C]//Proceedings of the 10th ACM Workshop on Multimedia and Security.New York,USA:ACM Press,2008:48-56.
[2]PEVNY T,BAS P,FRIDRICH J.Steganalysis by Subtractive Pixel Adjacency Matrix[J].IEEE Transactions on Information Forensics and Security,2010,5(2):215-224.
[3]HOU Xiaodan,ZHANG Tao,XIONG Gang,et al.Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History[J].KSII Transactions on Internet & Information Systems,2012,6(8):874-877.
[4]CHO S,GAWECKI M,KUO C C J.Content-dependent Feature Selection for Block-based Image Steganalysis[C]//Proceedings of IEEE International Symposium on Circuits and Systems.Washington D.C.,USA:IEEE Press,2012:1416-1419.
[5]汪然,许漫坤,平西建,等.基于分割的空域图像隐写分析[J].自动化学报,2014,40(12):2936-2943.
[6]KER A D.Batch Steganography and Pooled Stegana-lysis[C]//Proceedings of International Workshop on Information Hiding.Berlin,Germany:Springer,2006:265-281.
[7]KER A D,PEVN T.The Steganographer is the Outlier:Realistic Large-scale Steganalysis[J].IEEE Transactions on Information Forensics and Security,2014,9(9):1424-1435.
[8]CAO Gang,ZHAO Yao,NI Rongrong,et al.Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis[J].IEEE Signal Processing Letters,2011,18(10):603-606.
(下转第251页)
(上接第244页)
[9]CHEN Chenglong,NI Jiangqun,HUANG Jiwu.Blind Detection of Median Filtering in Digital Images:A Difference Domain Based Approach[J].IEEE Transactions on Image Processing,2013,22(12):4699-4710.
[10]ZHENG Ergong,PING Xijian,ZHANG Tao.Local Linear Transform and New Features of Histogram Characteristic Functions for Steganalysis of Least Significant Bit Matching Steganography[J].KSII Transactions on Internet & Information Systems,2011,5(4):840-855.
[11]Hawkins D M.Identification of Outliers[M].London,UK:Chapman and Hall,1980.
[12]杨宏宇,朱丹,谢丰,等.入侵异常检测研究综述[J].电子科技大学学报,2009,38(5):587-596.
[13]BREUNIG M M,KRIEGEL H P,NG R T,et al.LOF:Identifying Density-based Local Outliers[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2000:93-104.
[14]KRIEGEL H P,ZIMEK A.Angle-based Outlier Detection in High-dimensional Data[C]//Proceedings
of the 14th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining.New York,USA:ACM Press,2008:444-452.
[15]SHARP T.An Implementation of Key-based Digital Signal Steganography[C]//Proceedings of International Workshop on Information Hiding.Berlin,Germany:Springer,2001:13-26.
[16]LUO Weiqi,HUANG Fangjun,HUANG Jiwu.Edge Adaptive Image Steganography Based on LSB Matching Revisited[J].IEEE Transactions on Information Forensics and Security,2010,5(2):201-214.
[17]HOLUB V,FRIDRICH J.Designing Steganographic Distortion Using Directional Filters[C]//Proceedings of IEEE International Workshop on Information Forensics and Security.Washington D.C.,USA:IEEE Press,2012:234-239.
[18]HOLUB V,FRIDRICH J,DENEMARK T.Universal Distortion Function for Steganography in an Arbitrary Domain[J].EURASIP Journal on Information Security,2014(1):1-13.
[19]FRIDRICH J,KODOVSKY J.Rich Models for Steganalysis of Digital Images[J].IEEE Transactions on Information Forensics and Security,2012,7(3):868-882.
编辑顾逸斐 |