[1] |
沈昌祥, 张焕国, 冯登国 等. 信息安全综述[J]. 中国科学E辑:信息科学, 2007,37(2):129-150. SHEN C X , ZHANG H G , FENG D G , et al. Survey of information security[J]. Science in China Series: E, 2007,37(2):129-150.
|
[2] |
王朔中, 张新鹏, 张卫明 . 以数字图像为载体的隐写分析研究进展[J]. 计算机学报, 2009,32(7):1247-1263. WANG S Z , ZHANG X P , ZHANG W M . Recent advances in im-age-based steganalysis research[J]. Chinese Journal of Computers, 2009,32(7):1247-1263.
|
[3] |
KER A D , BAS P , B?HME R , et al. Moving steganography and stega-nalysis from the laboratory into the real world[A]. Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security[C]. Montpellier, France, 2013.45-58.
|
[4] |
PEVNY T , FRIDRICH J . Towards multi-class blind steganalyzer for JPEG images[A]. Proceedings of the 4th International Workshop on Digital Watermarking[C]. Siena, Italy, 2005.39-53.
|
[5] |
PEVNY T , FRIDRICH J . Multiclass detector of current steg-anographic methods for JPEG format[J]. IEEE Transactions on Information Forensics and Security, 2008,3(4):635-650.
|
[6] |
WANG P , LIU F L , WANG G D , et al. Multi-class steganalysis for JPEG stego algorithms[A]. Proceedings of the 15th IEEE International Conference on Image Processing[C]. San Diego, CA, 2008.2076-2079.
|
[7] |
DONG J , WANG W , TAN T N . Multi-class blind steganalysis based on image run-length analysis[A]. Proceedings of the 8th International Workshop on Digital Watermarking[C]. Guildford, UK, 2009.199-210.
|
[8] |
LUO X Y , WANG D S , WANG P , et al. A review on blind detection for image steganography[J]. Signal Processing, 2008,88(9):2138-2157.
|
[9] |
KODOVSKY J , FRIDRICH J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3):868-882.
|
[10] |
罗向阳, 刘粉林, 杨春芳 等. 基于最优小波包分解的图像隐写通用检测[J]. 中国科学:信息科学, 2010,40(2):327-339. LUO X Y , LIU F L , YANG C F , et al. Universal steganalysis based on best wavelet packet decomposition[J]. Science in China Series F: In-formation Sciences, 2010,40(2):327-339.
|
[11] |
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography with wet paper codes[A]. Proceedings of the 2004 ACM Workshop on Multimedia and Security[C]. Magdeburg, Germany, 2004.4-15.
|
[12] |
GUL G , KURUGOLLU F . SVD-based universal spatial domain image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2):349-353.
|
[13] |
PEVNY T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix[J] IEEE Transactions on Information Forensics and Security, 2010,5(2):215-224.
|
[14] |
FRIDRICH J , PEVNY T , KODOVSKY J . Statistically undetectable JPEG steganography: dead ends challenges, and opportunities[A]. Proceedings of the 9th ACM Workshop on Multimedia and Security[C]. 2007.3-14.
|
[15] |
ZHANG Y , LIU F L , LUO X Y , et al. Steganalysis of PQ based on the histogram difference between coefficient adjacent positions[A]. Proceedings of the 4th International Conference on Multimedia Information Networking and Security[C]. Nanjing, China, 2012.955-958.
|
[16] |
WESTFELD A . F5—A steganographic algorithm—high capacity despite better steganalysis[A]. Proceedings of the 4th International Workshop on Information Hiding[C]. Pittsburgh, PA, USA, 2001.289-302.
|
[17] |
SALLEE P . Model-based steganography[A]. Proceedings of the 2nd International Workshop on Digital Watermarking[C]. Seoul, Korea, 2003.154-167.
|
[18] |
FILLER T , FRIDRICH J . Design of adaptive steganographic schemes for digital images[A]. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII[C]. 2011.1-14.
|
[19] |
LUO X Y , LIU F L , LIAN S G , et al. On the typical statistic features for image blind steganalysis[J]. IEEE Journal on Selected Areas in Communications, 2011,29(7):1404-1422.
|
[20] |
陈铭, 张茹, 刘凡凡 等. 基于区域相关性的 LSB 匹配隐写分析[J]. 通信学报, 2010,31(3):1-11. CHEN M , ZHANG R , LIU F F , et al Steganalysis of LSB matching based on regional correlation[J]. Journal on Communications, 2010,31(3):1-11.
|
[21] |
MALIK H , SUBBALAKSHMI K P , CHANDRAMOULI R . Non-parametric steganalysis of QIM steganography using approximate entropy[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2):418-431.
|
[22] |
SALLEE P . Model-based methods for steganography and steganalysis[J]. International Journal of Image Graphics, 2005,5(1):167-190.
|
[23] |
CHANG C C , LIN C J . LIBSVM: a library for support vector machines[J]. ACM Transactions on Intelligent Systems and Technology, 2011,2(3):1-27.
|