[1] 郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究[J].电子学报,2006,34(6):1048-1052. Guo Yun-biao,You Xin-gang,Zhang Chun-tian,Zhou Lin-na.Study of image bit-plane complexity in the information hiding[J].Acta Electronica Sinica,2006,34(6):1048-1052.(in Chinese)
[2] H C Wu,N I Wu,C S Tsai,M S Hwang.Image steganographic scheme based on pixel-value differencing and LSB replacement methods[J].IEE Proceedings-Vision,Image and Signal Processing,2005,152(5):611-615.
[3] B Nguyen,S Yoon,H Lee.Multi bit plane image steganography[A].Proceedings of International Workshop on Digital Watermarking[C].Berlin:Springer,2006.61-70.
[4] C H Yang,C Y Weng,S J Wang,H M Sun.Adaptive data hiding in edge areas of images with spatial LSB domain systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
[5] 戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yue-wei,Liu Guang-jie,Ye Shu-guang.Adaptive steganography based on Hilbert filling curve[J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)
[6] W Hong.Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique[J].Information Sciences,2013,221(1):473-489.
[7] E Franz.Steganography preserving statistics properties[A].Proceedings of 5th International Workshop on Information Hiding[C].Noordwijkerhout:Springer,2002.278-294.
[8] W Luo,F Huang,J Huang.Edge adaptive image steganography based on LSB matching revisited[J].IEEE Transaction on Information Forensics and Security,2010,5(2):201-214.
[9] W Luo,F Huang,J Huang.A more secure steganography based on adaptive pixel-value differencing scheme[J].Multimed Tools Application,2011,52(2-3):407-430.
[10] T Pevny,T Filler,Bas P.Using high-dimensional image models to perform highly undetectable steganography[A].Proceedings of 12th International Conference on Information Hiding[C].Calgary:Springer,2010.161-177.
[11] T Filler,J Fridrich.Design of adaptive steganographic schemes for digital images[A].Proceedings of SPIE,Electronic Imaging,Security and Forensics of Multimedia XIII[C].San Francisco:SPIE,2011.1-14.
[12] 张良.一种基于幅度预测的隐写分析方法[J].电子学报,2010,38(11):2704-2707. Zhang liang.A steganalysis scheme using magnitude prediction[J].Acta Electronica Sinica,2010,38(11):2704-2707.(in Chinese)
[13] 毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,Yang Yi-xian,Shi Shu-jian.Steganalysis method based on JPEG cover image quantitative describing[J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)
[14] R Böhme,A Westfeld.Exploiting preserved statistics for steganalysis[A].Proceedings of 6th International Workshop on Information Hiding[C].Toronto:Springer,2004.82-96.
[15] S Tan,B Li.Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting[J].IEEE Signal Processing Letters,2012,19(6):336-339.
[16] P Schöttle,R Böhme.A game-theoretic approach to content-adaptive steganography[A].Proceedings of 14th International Conference on Information Hiding[C].Berkeley:Springer,2012.125-141. [LL]
[17] B Johnson,P Schöttle,R Böhme.Where to hide the bits?[A].Proceedings of Third International Conference on Decision and Game Theory for Security[C].Budapest:Springer,2012.1-17.
[18] A D Ker.Steganalysis of embedding in two least-significant bits[J].IEEE Transactions on Information Forensics and Security,2007,2(1):46-14.
[19] 罗向阳,刘粉林,杨春芳,廉士国.一类自适应隐写的更改比率估计[J].中国科学:信息科学,2011,41(3):297-310. Luo Xiang-yang,Liu Fen-Lin,Yang Chun-fang,Lian Shi-guo.Modification ratio estimation for a category of adaptive steganography[J].Science China:Information Sciences,2011,41(3):297-310.(in Chinese)
[20] Fridrich J.Steganography in Digital Media:Principles,Algorithms,and Applications(1st Ed)[M].New York:Cambridge University Press,2009.10-12.g F, Huang J. A more secure steganography based on adaptive pixel-value differencing scheme[J]. Multimed Tools Appl, 2011, 52(2-3):407-430.
[9] Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]. Proceedings of 12th International Conference on Information Hiding, Calgary, 2010, LNCS 6387: 161-177.
[10] Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images[C]. Proceedings of SPIE, Electronic Imaging, Security and Forensics of Multimedia XIII, San Francisco, 2011, vol. 7880: 1-14.
[11] B?hme R, Westfeld. A. Exploiting preserved statistics for steganalysis[C]. Proceedings of 6th International Workshop on Information Hiding, Toronto, 2004, LNCS 3200: 82-96.
[12] Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-Spline Fitting[J]. IEEE Siganl Processing Letters, 2012, 19(6): 336-339.
[13] Sch?ttle P, B?hme R. A Game-Theoretic Approach to Content-Adaptive Steganography[C]. Proceedings of 14th International Conference on Information Hiding, Berkeley, 2012, LNCS 7692: 125-141.
[14] Johnson B, Sch?ttle P, B?hme R. Where to hide the bits?[C]. Proceedings of Third International Conference Decision and Game Theory for Security, Budapest, 2012, LNCS 7638: 1-17.
[15] Gauvain J L, Lee C H. Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains[J]. IEEE Transactions on Speech and Audio Processing, 1994, 2(2): 291-298.
[16] Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. 1st edn. New York: Cambridge University Press, 2009: 10-12. |