Fridrich J,Goljan M,Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm// Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2002:310-323.
[2]
Bohme R. Westfeld A. Breaking cauchy model-based JPEG steganography with first order statiatics//Proceeding of ESORICS. Belin: Springer-Verlag,2004:125-140.
[3]
Westfeld A.F5-A steganographic algorithm: high capacity despite better steganalysis//Proc of the 4th International Workshop on Information Hiding. Berlin: Springer, 2001: 289-302.
[4]
Sallee P. Model-based methods for steganography and steganalysis[J]. International Journal of Image and Graphics,2005,15(1): 167-189.
[5]
Westfeld A, Pfitzmann A. Attacks on steganographic systems//Proceedings of 3rd International Workshop on Information Hiding. Berlin: Springer-Verlag, 1999:61-76.
[6]
Fridrich J, Pevny T. Merging markov and DCT features for multi-class JPEG steganalysis// Proc SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. San Jose:SPIE, 2007:1-13.
[7]
毛家发,林家俊. 基于净图描述的通用隐写分析技术[J].计算机学报,2010, 33(3): 569-579. Mao Jiafa, Lin Jiajun. A novel general steganalysis technique based on cover image describing[J]. Chinese Journal of Computers, 2010, 33(3): 569-579.