[1]
|
Sharp T. An implementation of key-based digital signal steganography. In: Proceedings of 4th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2001. 13-26
|
[2]
|
[2] Yang C, Weng C, Wang S. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensic Security, 2008, 3(3): 488-497
|
[3]
|
[3] Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensic Security, 2010, 5(2): 201-214
|
[4]
|
[4] Pevn T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of 12th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2010. 161-177
|
[5]
|
[5] Avcibas I, Memon N, Sankur B. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 2003, 12(2): 221-229
|
[6]
|
[6] Farid H. Detecting hidden messages using higher-order statistical models. In: Proceedings of IEEE International Conference on Image Processing. New York, USA: IEEE, 2002. 905-908
|
[7]
|
[7] Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia. San Jose, USA: SPIE, 2006. 1-13
|
[8]
|
[8] Xuan G R, Shi Y Q, Gao J H, Zou D K, Yang C Y, Zhang Z P, Chai P Q, Chen C H, Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of 7th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2005. 262-277
|
[9]
|
[9] Sullivan K, Madhow U, Chandrasekaran S, Manjunath B. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensic and Security, 2006, 1(2): 275-287
|
[10]
|
Pevn T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensic Security, 2010, 5(2): 215-224
|
[11]
|
Fridrich J, Kodovsk J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882
|
[12]
|
Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV. San Francisco, CA: SPIE, 2013. 86650L
|
[13]
|
Holub V, Fridrich J. Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 1996-2006
|
[14]
|
Kodovsk J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444
|
[15]
|
Amirkhani H, Rahmati M. New framework for using image contents in blind steganalysis systems. Journal of Electronic Imaging, 2011, 20(1): 013016-1-013016-14
|
[16]
|
Cho S, Cha B, Wang J, Kuo C C J. Block-based image steganalysis: algorithm and performance evaluation. In: Proceedings of IEEE International Symposium on Circuits and Systems, Piscataway. Paris: IEEE, 2010. 1679-1682
|
[17]
|
Xiong G, Ping X, Zhang T, Hou X. Image textural features for steganalysis of spatial domain steganography. Journal of Electronic Imaging, 2012, 21(3): 033015-1-033015-15
|
[18]
|
Schaefer G, Stich M. UCID - An Uncompressed Colour Image Database, Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K, 2003
|