Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 1-14
[2]
Fridrich J, Goljan M, Lisonek P, Soukal D. Writing on wet paper. IEEE Transactions on Signal Processing, 2005, 53(10): 3923-3935
[3]
Lu Y F, Li X L, Yang B. A secure steganography: noisy region embedding. In: Proceedings of 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kyoto, Japan: IEEE, 2009. 1046-1051
[4]
Singh Kh M, Singh L S, Singh A B, Devi Kh S. Hiding secret message in edges of the image. In: Proceedings of the 2007 International Conference on Information and Communication Technology. Dhaka, Bangladesh: IEEE, 2007. 238-241
[5]
Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214
[6]
Fridrich J, Goljan M, Soukal D. Efficient wet paper codes. In: Proceedings of the 7th International Workshop on Information Hiding. Barcelona, Spain: LNCS, 2005. 204-218
[7]
Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images. In: Proceedings of the 8th Electronic Imaging, Media Watermarking, Security, and Forensics. San Francisco, CA: SPIE, 2011. 24-26
[8]
Cai K W, Li X L, Zeng T Y, Yang B, Lu X Q. Reliable histogram features for detecting LSB matching. In: Proceedings of the 17th International Conference on Image Processing. Hong Kong, China: IEEE, 2010. 1761-1764
[9]
Zhang X, Zhang W, Wang S. Efficient double-layered steganographic embedding. IET Electronics Letters, 2007, 43(8): 482-483
[10]
Cheng Wei-Dong, Huang Ji-Wu, Liu Hong-Mei. A 3D-DCT-Based information hiding algorithm for color images. Acta Automatica Sinica, 2003, 29 (2): 258-266(程卫东, 黄继武, 刘红梅. 一种基于3D-DCT的彩色图像信息隐藏算法. 自动化学报, 2003, 29(2): 258-266)
[11]
Fridrich J, Kodovsky J, Goljan M, Holub V. Steganalysis of content-adaptive steganography in spatial domain. In: Proceedings of the 13th International Conference on Information Hiding. Prague, Czech Republic: LNCS, 2011. 102-117
[12]
Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trellis-coded quantization. In: Proceedings of the 7th Electronic Imaging, Media Forensics and Security. San Jose, USA: SPIE, 2009. 1-14
[13]
Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters, 2005, 12(1): 67-70
[14]
Yang C H, Weng C Y, Wang S J, Sun H M. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497
[15]
Liu G J, Liu W W, Dai Y W, Lian S G. An adaptive matrix embedding for image steganography. In: Proceedings of the 3rd International Conference on Multimedia Information Networking and Security. Shanghai, China: IEEE, 2011. 642-646
[16]
Fridrich J. Minimizing the embedding impact in steganography. In: Proceedings of the 8th Workshop on ACM Multimedia and Security. Geneva, Switzerland: ACM, 2006. 2-10
[17]
Schaefer G, Stich M. UCID: an uncompressed color image database. In: Proceedings of the 2nd Storage and Retrieval Methods and Applications for Multimedia. San Jose, USA: SPIE, 2003. 472-480
[18]
Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224
[19]
Zhang W M, Zhang X P, Wang S Z. Near-optimal codes for information embedding in gray-scale signals. IEEE Transactions on Information Theory, 2010, 55(3): 1262-1270