[1] |
FRIDRICH J . Steganography in digital media:principles,algorithms,and applications[M]// Steganography in Digital Media : Principles,Algorithms,and applications.Cambridge University Press, 2010: 1-20.
|
[2] |
CRANDALL R . Some notes on steganography[J]. Posted on SteganoGraphy Mailing List, 1998.
|
[3] |
PEVNY T , BAS P , FRIDRICH J . Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 215-224.
|
[4] |
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3): 868-882.
|
[5] |
SHI Y Q , SUTTHIWAN P , CHEN L . Textural features for steganalysis[C]// Information Hiding. 2012: 63-77.
|
[6] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935.
|
[7] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// Information Hiding.Springer Berlin Heidelberg. 2010: 161-177.
|
[8] |
HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// IEEE International Workshop on Information. 2013: 234-239.
|
[9] |
HOLUB V , FRIDRICH J . Digital image steganography using universal distortion[C]// The First ACM Workshop on Information Hiding and Multimedia Security. 2013: 59-68.
|
[10] |
LI B , WANG M , LI X ,et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1905-1917.
|
[11] |
DENEMARK T , FRIDRICH J . Improving steganographic security by synchronizing the selection channel[C]// The 3rd ACM Workshop on Information Hiding and Multimedia Security. 2015: 5-14.
|
[12] |
GUO L , NI J , SHI Y Q . Uniform embedding for efficient JPEG steganography[J]. IEEE Transactions on Information Forensics and Security, 2014,9(5): 814-825.
|
[13] |
BAS P , FILLER T , v T . Break our steganographic system:the Ins and outs of organizing BOSS[M]// Information Hiding. 2011: 59-70.
|
[14] |
FRIDRICH J . Study of cover source mismatch in steganalysis and ways to mitigate its impact[J]. SPIE-International Society for Optical Engineering, 2014,9028(2): 96-101.
|
[15] |
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing statistical detectability[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2): 221-234.
|
[16] |
FRIDRICH J , KODOVSKY J . Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics & Security, 2012,7(3): 868-882.
|
[17] |
KODOVSKY J , FRIDRICH J , HOLUB V . Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics & Security, 2012,7(2): 432-444.
|
[18] |
SEDIGHI V , FRIDRICH J , COGRANNE R . Toss that BOSSbase,Alice![J]. Electronic Imaging, 2016.
|
[19] |
PEVNY T KER A D . Towards dependable steganalysis[J]. SPIE-International Society for Optical Engineering, 2015,9409:94090I-94090I-14
|