[1] 钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004.
[2] 陈波,谭运猛,吴世忠.信息隐藏技术综述[J].计算机与数字工程,2005,2:21-23. Chen B,Tan Y M,Wu S Z.Research on information hiding techniques[J].Computer and Mathematical Engineering,2005,2:21-23.(in Chinese)
[3] 张茹,杨榆.数字版权管理[M].北京:北京邮电大学出版社,2008.
[4] C Cachin.An information-theoretic model for steganography[J].Information and Computation,2004,192(1):41-56.
[5] T Pevny,J Fridrich.Benchmarking for steganography[A].Proceedings of the 10th Information Hiding Workshop[C].Santa Barbara,CA,USA:Springer-LNCS,2008.5284:251-267.
[6] A D Ker.Estimating steganographic fisher information in real images[A].Proceedings of the 11th Information Hiding Workshop[C].Darmstadt,Germany:Springer-LNCS,2009.5806:73-88.
[7] T Filler,J Fridrich.Fisher information determines capacity of secure steganography[A].Proceedings of the 11th Information Hiding Workshop[C].Darmstadt:Springer-LNCS,2009.5806:31-47.
[8] A D Ker.A capacity result for batch steganography[J].IEEE Signal Processing Letters,2007,14(8):525-528.
[9] A D Ker,T Pevny,J Kodovsky,J Fridrich.The square root law of steganographic capacity[A].Proceedings of the 10th ACM Multimedia and Security Workshop (MM & Sec)[C].Oxford,UK:2008.107-116.
[10] T Filler,A D Ker,J Fridrich.The square root law of steganographic capacity for markov covers[J].Security,Steganography,and Watermarking of Multimedia Contents XI,Proceedings of SPIE,2009,7254:18-22.
[11] 王朔中,张新鹏,张开文等.数字密写与密写分析[M].北京:清华大学出版社,2005.
[12] J.Fridrich.Steganography in digital Media:Principles,Algorithms,and Applications[M].Cambridge:Cambridge University Press,2010.
[13] 张涛,平西建.空域LSB信息伪装的隐写分析及其对策[J].通信学报,2003,24(12):156-163. Zhang T,Ping X J.Steganalysis of spatial LSB-based steganagraphic algorithms and countermeasures[J].Journal of China Institute of Communications,2003.24(12):156-163.(in Chinese)
[14] Solanki K,Sarkar A,Manjunath B S.YASS:yet another steganagraphic scheme that resists blind steganalysis[A].Information Hiding,9th International Workshop[C].Saint Mala,France:Springer-Verlag,2007.16-31.
[15] Luo W Q,Huang F J,Huang J W.A more secure steganagraphy based on adaptive pixel-value differencing scheme[J].Multimedia Tools and Applications,2011,52(2):404-430.
[16] P Sallee.Model-based steganography[A].Digital Watermarking,2nd International Workshop[C].New York:Springer-Verlag Press,2004.154-167.
[17] P Sallee.Model-based methods for steganography and steganalysis[J].International Journal of Image and Graphics,2005,5(1):167-190.
[18] Amin P K,Liu N,Subbalakshmi K P.Statistically secure digital image data hiding[J].IEEE Multimedia Signal Processing,2005:497-500.
[19] Sarkar A,S K,Mdahow U.Secure steganagraphy:statistical restoration of the second ordor dependencies for improved security[J].Acoustics,Speech and Signal Processing,2007:277-280.
[20] 张石树,汤光明.一种保持频域高阶统计特性不变的隐写算法[J].计算机工程,2008,34(17):149-153. Zhang S S,Tang G M.Steganograph algorithm on preservation of high order statistics in frequency domain[J].Comupter Engineering,2008.34(17):149-153.(in Chinese)
[21] A D Ker.Perturbation hiding and the batch steganography problem[A].Proceedings of the 10th International Workshop on Information Hiding[C].Santa Barbara,CA,USA:Springer-LNCS,2008.5284:45-59.
[22] Tang WX,Li B,Luo WQ,Huang JW.Clustering steganographic modification directions for color components[J].IEEE Signal Processing Letters,2016,23(2):197-201.
[23] K.Petrowski.Psteg:steganographic embedding through patching[A].Proceedings of the 30th IEEE International Conference on Acoustics,Speech,and Signal Processing (ICASSP)[C].Philadelphia,2005.537-540.
[24] Wu K C,Wang C M.Steganography using reversible texture synthesis[J].IEEE Transactions Image Processing,2015,24(1):130-139.
[25] 孙星明,殷建平,陈火旺等.汉字的数学表达式研究[J].计算机研究与发展,2002,39(6):707-711. Sun X M,Yin J P,Chen H W,et al.On mathematical expression of a Chinese character[J].Journal of Computer Research and Development,2002,39(6):707-711.(in Chinese)
[26] Z Zhou,H.Sun,R Harit,X Sun,X Chen.Coverless image steganography without embedding[J].LNCS,2016,9483:123-132.
[27] Fridrich J,Goljan M,Du R.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,Special Issue on Security,2001,22-28.
[28] C Yang,X Luo,F Liu.Embedding ratio estimating for each bit plane of image[A].Proceedings of the 11th Information Hiding Workshop[C].Darmstadt,Germany:Springer-LNCS,2009.5806.59-72.
[29] A D Ker.Derivation of error distribution in least squares steganalysis[J].IEEE Trans Information Forensics and Security,2007,2(2):140-148.
[30] Fridrich J,Goljan M,Hogea.Steganalysis of JPEG:breaking the F5 algorithm[A].Proceedings of the 5th Information Hiding Workshop[C].The Netherlands:Springer-LNCS,2002.2578:310-323.
[31] X Luo,D Wang,P Wang,F Liu.A review on blind detection for image steganography[J].Signal Processing,2008,88:2138-2157.
[32] I Avcibas,M Kharrazi,N D Memon,B.Sankur.Image steganalysis with binary Similarity measures[J].EURASIP Journal on Applied Signal Processing,2005,17:2749-2757.
[33] T.Pevny and J.Fridrich.Merging markov and DCT features for multi-class JPEG steganalysis[J].Electronic Imaging,Security,Steganography,and Watermarking of Multimedia Contents IX,Proceedings of SPIE,2007,6505:3-4.
[34] Y Q Shi,C Chen,W Chen.A Markov process based approach to effective attacking JPEG steganography[A].Proceedings of the 8th Information Hiding Workshop[C].Alexandria,VA,USA:Springer-LNCS,2006.4437:249-264.
[35] X Y Luo,F L Liu,S G Lian,C F Yang,S Gritzalis.On the typical statistic features for image blind steganalysis[J].IEEE Journal of Selected Areas in Communications,2007,29(7):1404-1422.
[36] T Penvy,P.Bas,J Fridrich.Steganalysis by subtractive pixel adjacency matrix[J].IEEE Trans Information Forensics and Security,2010,5(2):215-224.
[37] Han Zong,Fenlin Liu,Xiangyang Luo.A wavelet-based blind JPEG image steganalysis using co-occurrence matrix[A].The 11th International Conference on Advanced Communication Technology[C].Phoenix Park,Republic of Korea,2009.1933-1936.
[38] Y Wang,J Liu,W Zhang.Blind JPEG steganalysis based on correlations of DCT coefficients in multi-directions and calibrations[A].Multimedia Information Networking and Security,International Conference[C].Hubei,2009.495-499.
[39] W Lie,G Lin.A feature-based classification technique for blind image steganalysis[J].IEEE Trans Multimedia,2005,7(5):1007-1020.
[40] T Pevny,J Fridrich.Novelty detection in blind steganalysis[A].Proceedings of the 10th ACM Multimedia and Security Workshop (MM & Sec)[C].Oxford,UK:2008.167-176.
[41] J Fridrich,J Kodovsky.Rich models for steganalysis of digital images[J].IEEE Trans Information Forensics and Security,2012,7(3):868-882.
[42] B Chen,G Feng,X Zhang,F Li.Mixing high-dimensional features for JPEG steganalysis with ensemble classifier[J].Signal,Image and Video Processing,2014,8(8):1475? 1482.
[43] F Li,X Zhang,B Chen,G Feng.JPEG steganalysis with high-dimensional deatures and bayesian ensemble classifier[J].IEEE Signal Processing Letters,2013,20(3):233-236.
[44] 王丽娜,王旻杰,邵锋,翟黎明,任延珍.面向隐写分析的数字图像固有特性研究[A].第十一届全国信息隐藏暨多媒体信息安全学术大会[C].西安,2013.336-344. Wang L N,Wang M J,Shao F,Zhai L M,Ren Y Z.Research of image properties for steganalysis[A].Proceedings of of 11th China Information Hiding Workshop[C].Xi'an,China,2013 336-344.(in Chinese)
[45] A Ker,T Pevny.Identifying a steganographer in realistic and heterogeneous data sets[J].Media Watermarking,Security,and Forensics,Proceedings of SPIE,2012:8303.
[46] 周琳娜,等.数字图像内容取证[M].北京:高等教育出版社,2011..
[47] Crandall r.Some Notes on Steganography[EB/OL].http://os.inf.tudresden.de/~westfeld/randall.pdf,2007.12.
[48] 李玉辉,刘九芬,张卫明.基于二元golay隐写码的快速隐写算法[J].信息工程大学学报,2007,8(3):269-271. Li Y H,Liu J F,Zhang W M.Fast steganographic algorithm based on the golay codes[J].Journal of Infromation Engineering University,2007,8(3):269-271.(in Chinese)
[49] Schonfeld D,Winlker A.Embedding with syndrome coding based on BCH codes[A].Proceedings of the 8th ACM multimedia and security workshop[C].Geneva,Switzerland,2006.214-223.
[50] X Zhang,S Wang.Dynamical running coding in digital steganography[J].IEEE Signal Processing Letters,2006,13(3):165-168.
[51] F Willems,M Dijk.Capacity and codes for embedding information in gray-scale signals[J].IEEE Trans Information Theory,2005,51(3):1209-1214.
[52] J Fridrich,T Filler.Practical methods for minimizing embedding impact in steganography[J].Electronic Imaging,Media Forensics,and Security IX,Proceedings of SPIE,2007,6050:1-15.
[53] J Fridrich,M Goljan,P Lisonek,D Soukal.Writing on wet paper[J].IEEE Trans Signal Processing,2005,53(10):3923-3935.
[54] W Zhang,X Zhang,S Wang.Maximizing steganagraphic embedding efficiency by combining Hamming codes and wet paper codes,[A].Proceedings of the 10th International Workshop on Information Hiding[C].Santa Barbara,CA,USA:Springer-LNCS,2008.5284:60-71.
[55] T Filler,J Judas,J Fridrich.Minimizing additive distortion in steganography using Syndrome-Trellis code[J].IEEE Trans Information Forensics and Security,2011,6(3):920-935.
[56] T Pevny,T Filler,P Bas.Using high-dimensional image models to perform highly undetectable steganography[A].Proceedings of the 12th Information Hiding Workshop[C].Calgary,Canada:Springer-LNCS,2010.8948:161-171.
[57] V Holub,J Fridrich.Designing steganagraphic distortion using directional filters[A].Proceedings of the 4th IEEE International Workshop on Information Forensics and Security (WIFS)[C].Tenerife,Spain:2012.234-239.
[58] V Holub,J Fridrich.Digital image steganography using universal distortion[A].Proceedings of the 1st IEEE Information Hiding and Multimedia Security Workshop (IH& MMSec)[C].Montpellier,France:2013.59-68.
[59] B Li,S Tan,M Wang,J Huang.Investigation on cost assignment in spatial image steganography[J].IEEE Trans.Information Forensics and Security,2014,9(8):1264-1277.
[60] B Li,M Wang,J Huang,X Li.A new cost function for spatial image steganography[A].Proceedings of the 21th IEEE International Conference on Image Processing (ICIP)[C].Paris,France:2014.4206-4210.
[61] J Fridrich,J Kodovsky.Multivariate Gaussian model for designing additive distortion for steganography[A].Proceedings of the 38th IEEE International Conference on Acoustics,Speech,and Signal Processing (ICASSP)[C].Vancouver,BC,Canada:2013.2949-2953.T. Pevny, “Batch Steganography in the Real World,” Proceedings of the 14th ACM Multimedia and Security Workshop, pp.1-10, 2012.
[39] A. Ker and T. Pevny, “The Steganographer is the Outlier: Realistic Large-Scale Steganalysis” , IEEE Trans. Information Forensics and Security, 9(9), pp. 1424-1435, 2014.
[40] Tang WX, Li B, Luo WQ and Huang JW, “Clustering Steganographic Modification Directions for Color Components”, IEEE SIGNAL PROCESSING LETTERS, 23(2), pp. 197-201, 2016
[41] K. Petrowski, “Psteg: Steganographic Embedding through Patching,” Proceedings of the 30th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp.537-540, 2005.
[42] 孙星明,殷建平,陈火旺等,汉字的数学表达式研究。计算机研究与发展,Vol.39, No.6, 2002.06.15. pp707-711.
[43] Qi Cao, Sun Xingming, Xiang Lingyun. A secure text steganography based on synonym substitution. 2013 IEEE Conference Anthology, ANTHOLOGY 2013, January.
[44] Fridrich J, Goljan M, Du R. Detecting LSB steganography in Color and Gray-Scale Images. Magazine of IEEE Multimedia, Special Issue on Security, 2001.pp.22-28.
[45] C. Yang, X. Luo, and F. Liu, “Embedding Ratio Estimating for Each Bit Plane of Image” , Proceedings of the 11th Information Hiding Workshop, LNCS, 5806, pp. 59-72, 2009.
[46] A. D. Ker, “Derivation of Error Distribution in Least Squares Steganalysis,” IEEE Trans. Information Forensics and Security, 2(2), pp. 140-148, 2007.
[47] Fridrieh J,Goljan M,Hogea D,Steganalysis of JPEG: breaking the F5 algorithm. Lecture Notes in Computer Science: Information Hiding Workshop, 2002.
[48] Kodovsky J,FridrichJ. Quantitative structural steganalysis of Jsteg [J].IEEE Transactions on Information Forensics and Security,2010,5(4):681-693.
[49] X. Luo, D. Wang, P. Wang, and F. Liu, A Review on Blind Detection for Image Steganography, Signal Processing, 88, pp. 2138-2157, 2008.
[50] A. D. Ker, Steganalysis of LSB Matching in Gray scale Images, IEEE Signal Processing Letters, 12(6), pp. 441-444, 2005.
[51] F. Huang, B. Li, and J. Huang, Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighborhood Gray Levels, Proceedings of the 14th IEEE International Conference on Image Processing (ICIP), pp. 401-404, 2007.
[52] J. Zhang and D. Zhang, Detection of LSB Matching Steganography in Decompressed Images, IEEE Signal Processing Letters, 17(2), pp. 141-144, 2010.
[53] I. Avcibas, N. Memon, and B. Sankur, Steganalysis Using Image Quality Metrics, IEEE Trans. Image Processing, 12(2), pp. 221-229, 2003
[54] I. Avcibas, M. Kharrazi, N. D. Memon and B. Sankur, “Image Steganalysis with Binary Similarity Measures,” EURASIP Journal on Applied Signal Processing, 17, pp. 2749-2757, 2005.
[55] J. Fridrich, Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, Proceedings of the 6th International Workshop, LNCS,3200, pp. 67-81, 2004.
[56] T. Pevny and J. Fridrich, Merging Markov and DCT Features for Multi-class JPEG Steganalysis, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 6505, pp. 3-4, 2007.
[57] Q. Liu, Steganalysis of DCT-Embedding Based Adaptive Steganography and YASS, Proceedings of the 13th ACM Multimedia and Security Workshop (MM&Sec), pp. 77-86, 2011.
[58] Sarkar A, Solanki K, Manjunath B S, Futher study on YASS: steganagraphy based on randomized embedding to resist blind steganalysis, in Processing of SPIE: Security and Watermarking of Multimedia Contents. SPIE.pp1-11.2008.
[59] Y.-Q. Shi, C. Chen, and W. Chen, A Markov Process Based Approach to Effective Attacking JPEG Steganography, Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 4437, pp. 249-264, 2007
[60] X. Y. Luo, F. L. Liu, S. G. Lian, C. F. Yang and S. Gritzalis, On the Typical Statistic Features for Image Blind Steganalysis, IEEE Journal of Selected Areas in Communications, 29(7), pp.1404-1422, 2011.
[61] T. Penvy, P. Bas and J. Fridrich, Steganalysis by Subtractive Pixel Adjacency Matrix, IEEETrans. Information Forensics and Security, 5(2), pp. 215-224, 2010.
[62] Han Zong, Fenlin Liu and Xiangyang Luo, A wavelet-based blind JPEG image steganalysis using co-occurrence matrix, Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on, Phoenix Park, 2009, pp. 1933-1936.
[63] Y. Wang, J. Liu and W. Zhang, Blind JPEG Steganalysis Based on Correlations of DCT Cofficients in Multi-directions and Calibrations, Multimedia Information Networking and Security, 2009. MINES '09. International Conference on, Hubei, 2009, pp. 495-499.
[64] W. Lie and G. Lin, A Feature-Based Classification Technique for Blind Image Steganalysis, IEEE Trans. Multimedia, 7(5), pp. 1007-1020, 2005.
[65] T. Pevny and J. Fridrich, Novelty Detection in Blind Steganalysis, Proceedings of the 10thACM Multimedia and Security Workshop (MM&Sec), pp. 167-176, 2008.
[66] T. Brent, L. Gilbert, and C. Gustafson, “A New Blind Method for Detecting Novel Steganography,” Digital Investigation, 2(1), pp. 50-70, 2006.
[67] J. Kodovsky, T. Pevny, and J. Fridrich, “Modern Steganalysis Can Detect YASS,” Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XII,Proceedings of SPIE ,7541, pp. 201-211, 2010.
[68] J. Kodovsky, J. Fridrich and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE Trans. Information Forensics and Security, 7(2), pp. 432-444, 2012.
[69] J. Kodovsky and J. Fridrich, “Steganalysis of JPEG Images Using Rich Models,” Electronic Imaging, Media Watermarking, Security, and Forensics of Multimedia XIV, Proceedings ofSPIE, 8303, pp. 1-13, 2012.
[70] J. Fridrich and J. Kodovsky, “Rich Models for Steganalysis of Digital Images,” IEEE Trans. Information Forensics and Security, 7(3), pp. 868-882, 2012.
[71] B. Chen, G. Feng, X. Zhang, and F. Li, “Mixing High-Dimensional Features for JPEG Steganalysis with Ensemble Classifier,” Signal, Image and Video Processing, 8(8), pp.1475?1482, 2014.
[72] F. Li, X. Zhang, B. Chen, and G. Feng, “JPEG Steganalysis with High-Dimensional Features and Bayesian Ensemble Classifier,” IEEE Signal Processing Letters, 20(3), pp. 233-236,2013.
[73] 王丽娜,王旻杰,邵锋,翟黎明,任延珍,面向隐写分析的数字图像固有特性研究. 2013 - 第十一届全国信息隐藏暨多媒体信息安全学术大会 CIHW2013
[74] R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu, “A CoverImage Model for Reliable Steganalysis,” Proceedings of the 13th International Workshop onInformation Hiding, LNCS, 6958, pp. 178-192, 2011.
[75] R. Cogranne, F. Retraint, C. Zitzmann, I. Nikiforov, L. Fillatre, and P. Cornu, “Hidden Information Detection Using Decision Theory and Quantized Samples: Methodology, Difficulties and Results,” Digital Signal Processing, vol. 24, pp. 144-161, Jan. 2014.
[76] R. Cogranne, T. Denemark and J. Fridrich, “Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory,” Proceedings of the 6th IEEE International Workshop on Information Forensics and Security (WIFS), 2014.
[77] R. Cogranne and F. Retraint, “An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection,” IEEE Trans. Information Forensics and Security, 8(3), pp. 464-476,2013.
[78] C. Zitzmann, R. Cogranne, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu, “Statistical Decision Methods in Hidden Information Detection,” Proceedings of the 13th International Workshop on Information Hiding, LNCS, 6958, pp. 163-177, 2011.
[79] T. H. Thai, R. Cogranne and F. Retraint, “Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm,” IEEE Trans. Image Processing, 23(5), pp.1980-1993, 2014.
[80] 陈够喜,陈俊杰. 多载体信息隐藏安全性研究. 小型微型计算机系统. 2011,32(4).pp644-648.
[81] A. Ker and T. Pevny, “A New Paradigm for Steganalysis via Clustering,” Media Watermarking, Security, and Forensics III, Proceedings of SPIE, 7880, 2011.
[82] A. Ker and T. Pevny, “Identifying a Steganographer in Realistic and Heterogeneous Data Sets,” Media Watermarking, Security, and Forensics, Proceedings of SPIE, 8303, 2012.
[83] 周琳娜等,数字图像内容取证,高等教育出版社,2011年8月. pp114-132.
[84] Cralldall r. Some Notes on Steganography [eb/ol]. http://os.inf.tudresden.de/~westfeld/ randall.pdf, 2007.12.
[85] 李玉辉,刘九芬,张卫明。基于二元golay隐写码的快速隐写算法[j]信息工程大学学报。2007,8(3):269-271.
[86] Schonfeld d, and Winlker a. Embedding with Syndrome Coding Based on BCH Codes[c]. in: proceedings of the 8th acm multimedia and security workshop. 2006:214-223.
[87] X Zhang, S Wang. Dynamical running coding in digital steganography[j]. IEEE Signal Processing Letters, 13(3):165-168, 2006.
[88] F. Willems and M. Dijk, “Capacity and Codes for Embedding Information in Gray-Scale Signals,” IEEE Trans. Information Theory, 51(3), pp. 1209-1214, 2005.
[89] J. Fridrich and T. Filler, “Practical Methods for Minimizing Embedding Impact in Steganography,” Electronic Imaging, Media Forensics, and Security IX, Proceedings of SPIE, 6050, pp. 650502.1-15, 2007.
[90] J. Fridrich, M. Goljan, P. Lisonek and D. Soukal, “Writing on Wet Paper,” IEEE Trans. Signal Processing, 53(10), pp. 3923-3935, 2005.
[91] W. Zhang, X. Zhang, and S. Wang, Maximizing steganagraphic embedding efficiency by combining Hamming codes and wet paper codes, in Lecture Notes in Computer Scientce.2008, Springer-Verlag: Santa Barbara CA, USA, pp.60-71.
[92] T. Filler, J. Judas, and J. Fridrich, “Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes,” IEEE Trans. Information Forensics and Security, 6(3), pp. 920–935, 2011.
[93] Liu WW, Liu GJ and Dai YW, “Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency”, SECURITY AND COMMUNICATION NETWORKS, 8(9), pp. 1636-1647, 2015
[94] T. Pevny, T. Filler, and P. Bas, “Using High-Dimensional Image Models to Perform Highly Undetectable Steganography,” Proceedings of the 12th Information Hiding Workshop, LNCS,8948, pp. 161-171, 2010.
[95] V. Holub and J. Fridrich, “Designing Steganagraphic Distortion Using Directional Filters,” Proceedings of the 4th IEEE International Workshop on Information Forensics and Security(WIFS), pp. 234–239, 2012.
[96] V. Holub and J. Fridrich, “Digital Image Steganography Using Universal Distortion,” Proceedings of the 1st IEEE Information Hiding and Multimedia Security Workshop(IH&MMSec),pp.59-68,2013.
[97] B. Li, S. Tan, M. Wang, and J. Huang, “Investigation on Cost Assignment in Spatial Image Steganography,” IEEE Trans. Information Forensics and Security, 9(8), pp. 1264-1277, 2014.
[98] B. Li, M. Wang, and J. Huang, and X. Li, “A New Cost Function for Spatial Image Steganography,” Proceedings of the 21th IEEE International Conference on Image Processing(ICIP), pp. 4206-4210, 2014.
[99] J. Fridrich and J. Kodovsky, “Multivariate Gaussian Model for Designing Additive Distortion for Steganography,” Proceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 2949-2953, 2013.
[100] V. Sedighi, Fridrich J,R. Cogranne. Toss that BOSS base, Alice! Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, February 14-18, 2016.
[101] Design of adaptive steganographic schemes for digital images, with T. Filler, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23-26, 2011. |