[1] 张涛, 平西建, 徐长勇. 基于图像平滑度的空域LSB嵌入的检测算法[J]. 计算机辅助设计与图形学学报, 2006, 18(10):1607-1612.
ZHANG Tao, PING Xijian, XU Changyong. Detection algorithm for spatial LSB embedding based on image smoothness[J]. Journal of Computer Aided Design & Computer Graphics, 2006, 18(10):1607-1612.
[2] GUI G, DIRIK A E, AVCIBAS I. Steganalytic features for JPEG compressionbased perturbed quantization[J]. IEEE Signal Processing Letters, 2007, 14(3):205-208.
[3] AVCIBAS I, MEMON N, SANKUR B. Steganalysis based on image quality metrics [C]∥ IEEE Fourth Workshop on Multimedia Signal Processing. Cannes, France: Institute of Electrical and Electronics Engineers Inc., 2001:517-522.
[4] FARID H, SIWEI L. Detecting hidden messages using higherorder statistics and support vector machines [C]∥ Proceedings of the 5th Information Hiding Workshop. Noordwijkerhout, Netherlands: Springer~Verlag, 2002: 340-354.
[5] FRIDRICH J. Featurebased steganalysis for JPEG images and its implications for future design of steganographic schemes [C]∥ Proceedings of the 6th Information Hiding Workshop. Toronto, Ontario, Canada: Springer~Verlag, 2005: 67-81.
[6] HARMSEN J, PEARLMAN W. Steganalysis of additive noise modelable information hiding [C]∥ Proceedings of SPIE Security Watermarking Multimedia Contents. Santa Clara, CA: SPIE, 2003: 131-142.
[7] SHI Y Q, XUAN G R, ZOU D K, et al. Steganalysis based on moments of characteristic functions using wavelet decomposition, predictionerror image, and neural network [C]∥ Proceedings of the IEEE International Conference on Multimedia & Expo 2005. Amsterdam, Netherlands:\
[s.n.\], 2005:269-272.
[8] SHI Y Q, CHEN C H, CHEN W. A Markov process based approach to effective attacking JPEG steganography [C]∥ Proceedings of the 8th Information Hiding Workshop. Alexandria, VA, USA: Springer~Verlag, 2007: 249-264.
[9] PENVY T, FRIDRICH J. Merging markov and DCT features for multiclass JPEG steganalysis [C]∥ Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose: Society for Imaging Science and Technology and SPIE. 2007, 650530-1-650530-13.
[10] CHEN C H, SHI Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations [C]∥ IEEE International Symposium on Circuits and Systems. Seattle, Washington, USA: IEEE, 2008: 3029-3032.
[11] 毛家发,林家骏,戴蒙. 基于图像攻击的隐藏信息盲检测技术[J]. 计算机学报, 2009, 32(2):318-327.
MAO Jiafa, LIN Jiajun, DAI Meng. An attacked image based hidden messages blind detect technique[J]. Chinese Journal of Computers, 2009, 32(2):318-327.
[12] LIU Q Z, SUNG A H, QIAO M Y. Improved detection and evaluation for JPEG steganalysis [C]∥ Proceedings of the Seventeen ACM International Conference on Multimedia, New York:\
[s.n.\], 2009:873-876.
[13] 黄方军,黄继武. 基于图像校准的通用型JPEG隐写分析[J]. 中国科学 F辑:信息科学, 2009, 39(4):383-390.
HUANG Fanjun, HUANG Jiwu. Calibration based universal JPEG steganalysis[J]. Science in China Series F: Information Sciences, 2009, 39(4):383-390.
[14] LUO X Y, WANG D S, HU W, et al. Blind detection for image steganography: a system framework and implementation[J]. International Journal of Innovative Computing, Information and Control, 2009, 5(2):433-442.
[15] LIE W N, LIN G S. A featurebased classification technique for blind image steganalysis[J]. IEEE Transactions on Multimedia, 2005, 7(6): 1007-1020.
[16] HOLOTYAK T, FRIDRICH J, VOLOSHYNOVSKIY S. Blind statistical steganalysis of additive steganography using wavelet higher order statistics [C]∥ Proceeds of the IFIP Conference on Communications and Multimedia Security. Salzburg,Austria:Springer LNCS, 2005,3677: 273-274.
[17] 平姈娣,刘祖根,史烈,等. 基于易变特征实现隐藏信息的盲检测[J]. 浙江大学学报:工学版, 2007, 41(3):374-379.
PING Lingdi, LIU Zugen, SHI Lie, et al. Variable characteristics based blind detection of hidden information [J]. Journal on Zhejiang University :Engineer Science, 2007, 41(3):374-379.
[18] 毛勇,周晓波,夏铮,等. 特征选择算法研究综述[J]. 模式识别与人工智能, 2007, 20(2):211-208.
MAO Yong, ZHOU Xiaobo, XIA Zheng, et al. A Survey for study of feature selection algorithms[J]. Pattern Recognition and Artificial Intelligence, 2007, 20(2):211-208.
[19] LATHAM A. Jphide&Seek[CP/DK].\
[2009-09-01\]. http:∥linux01.gwdg.de/~alatham/stego.html.
[20] PROVOS N. Defending against statistical steganalysis[C]∥ Proceedings of the 10th Usenix Security Symposium. Washington USA:[n.s.],2001: 323-335.
[21] HETZL S, MUTZEL P. A graphtheoretic approach to steganography[C]∥ Proceedings of the 9th IFIP TC6 TC11 International Conference. Salzburg, Austria: Springer~Verlag, 2005: 119-128.
[22] SALLEE P. Model based steganography[C]∥ Proceedings of the 2rd International Workshop on Digital Watermarking. Seoul, Korea: Springer~Verlag, 2004:154-167.
[23] SALLEE P. Modelbased methods for steganography and steganalysis[J]. International Journal of Image and Graphics, 2005, 5(1):167-189.
[24] CHANG C C, LIN C J. LIBSVM: a library for support vector machines, 2001 [CP/DK]. \
[2009-09-01\]. http:∥www.csie.ntu.edu.tw/cjlin/libsvm. |