[1] |
CHEDDAD A , CONDELL J , CURRAN K ,et al. Digital image steganography:survey and analysis of current methods[J]. Signal Processing, 2010,90(3): 727-752.
|
[2] |
SHARP T , . An implementation of key-based digital signal stegano-graphy[C]// The International Workshop on Information Hiding. 2001: 13-26.
|
[3] |
LUO W , HUANG F , HUANG J . Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 201-214.
|
[4] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// The International Workshop on Information Hiding. 2010: 161-177.
|
[5] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Information Forensics and Security(WIFS). 2012: 234-239.
|
[6] |
SULLIVAN K , MADHOW U , CHANDRASEKARAN S ,et al. Steganalysis of spread spectrum data hiding exploiting cover memory[C]// The International Society for Optics and Photonics,Electronic Imaging. 2005: 38-46.
|
[7] |
ZOU D , SHI Y Q , SU W ,et al. Steganalysis based on Markov model of thresholded prediction-error image[C]// IEEE International Conference on Multimedia and Expo. 2006: 1365-1368.
|
[8] |
PEVNY T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adja-cency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 215-224.
|
[9] |
凌轶华, 蔡晓霞, 陈红 . 应用共生矩阵特征的改进自适应 JPEG 隐写[J]. 计算机应用研究, 2014(11): 3490-3493.
|
|
LING Y H , CAI X X , CHEN H . Improved adaptive steganographic algorithm for JPEG images based on co-occurrence matrix feature[J]. Application Research of Computers, 2014(11): 3490-3493.
|
[10] |
FRIDRICH J , KODOVSKY J , HOLUB V ,et al. Steganalysis of con-tent-adaptive steganography in spatial domain[C]// The International Workshop on Information Hiding. 2011: 102-117.
|
[11] |
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 868-882.
|
[12] |
CORTES C , VAPNIK V . Support-vector networks[J]. Machine Learning, 1995,20(3): 273-297.
|
[13] |
LYU S , FARID H . Detecting hidden messages using higher-order statistics and support vector machines[C]// The International Workshop on Information Hiding. 2002: 340-354.
|
[14] |
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for stegana-lysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 432-444.
|
[15] |
DUDA R O , HART P E , STORK D G . Pattern classification[M]. New York: WileyPress, 1973.
|
[16] |
陈世媛, 汤光明, 高瞻瞻 . 基于权值分配的隐写分析算法[J]. 计算机应用研究, 2016,(11): 3468-3471.
|
|
CHEN S Y , TANG G M , GAO Z Z . Steganalysis method based on weight allocation[J]. Application Research of Computers, 2016(11): 3468-3471.
|
[17] |
GOLJAN M , FRIDRICH J , HOLOTYAK T . New blind steganalysis and its implications[C]// The International Society for Optics and Photonics,Electronic Imaging. 2006: 1-13.
|
[18] |
FRIDRICH J,KODOVSKY J , HOLUB V , et al . Breaking HUGO–the process discovery[C]// The International Workshop on Information Hiding. 2011: 85-101.
|
[19] |
HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014(1): 1.
|