[1] |
NI J , YE J , YI Y . Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2545-2557.
|
[2] |
FILLER T , JUDAS J , FRIDRICH J . Minimizingadditive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3): 920-935.
|
[3] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing embedding impact in steganography using trellis-coded quantization[C]// International Conference on Multimedia Computing and Systems,April 14-16,2014,Marrakesh Morocco. Piscataway:IEEE Press, 2014.
|
[4] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[J]. Lecture Notes in Computer Science, 2010(6387): 161-177.
|
[5] |
HOULUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// IEEE International Workshop on Information Forensics and Security,December 2-5,2012,Costa Adeje-Tenerife,Spain. Piscataway:IEEE Press, 2012: 234-239.
|
[6] |
HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014, 1(1): 1-13.
|
[7] |
邹明光, 李芝棠 . 基于振幅值修改的WAV音频隐写算法[J]. 通信学报, 2014 (s1).
|
|
ZOU M G , LI Z T . WAV-audio steganagraphy algorithm based on amplitude modifying[J]. Journal on Communications, 2014(s1).
|
[8] |
LUO W , ZHANG Y , LI H . Adaptive audio steganography based on advanced audio coding and syndrome-tcoding[J]. International Workshop on Digital Watermarking, 2017(10431): 177-186.
|
[9] |
KIM D H , YANG S J , CHUANG J H . Additive data insertion into MP3 bitstream using linbits characteristics[C]// IEEE International Conference on Acoustics,Speech,and Signal Processing,May 21-23,2014,Montreal,Que,Canada. Piscataway:IEEE Press, 2014: 181-184.
|
[10] |
YAN D Q , WANG R D , YU X , et al. Steganography for MP3 audio by exploiting the rule of window switching[J]. Computers &Security, 2012, 31(5): 704-716.
|
[11] |
严迪群 . 压缩域音频隐写与隐写分析中若干问题的研究[D]. 宁波: 宁波大学, 2012.
|
|
YAN D Q . Research about several problems of steganography and steganalysis in audio compressed domain[D]. Ningbo:Ningbo University, 2012.
|
[12] |
刘昌鑫, 朱平, 夏春和 . F5隐写算法及其隐写分析研究[J]. 计算机工程与设计, 2007, 28(4): 884-887.
|
|
LIU C X , ZHU P , XIA C H . Research on F5 steganography algorithm and its steganalysis[J]. Computer Engineering and Design, 2007, 28(4): 884-887.
|