Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensic Security, 2010, 5(2): 201-214
[2]
Avcibas I, Memon N, Sankur B. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 2003, 12(2): 221-229
[3]
Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications. In: Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia. San Jose, USA: SPIE, 2006. 1-13
[4]
Sullivan K, Madhow U, Chandrasekaran S, Manjunath B. Steganalysis for Markov cover data with applications to images. IEEE Transactions on Information Forensic and Security, 2006, 1(2): 275-287
[5]
Fridrich J, Kodovsky J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882
[6]
Holub V, Fridrich J. Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security, 2013, 8(12): 1996-2006
[7]
Amirkhani H, Rahmati M. New framework for using image contents in blind steganalysis systems. Journal of Electronic Imaging, 2011, 20(1): 013016-1-013016-14
[8]
Filler T, Pevny T, Bas P. BOSS. [Online], available: http://boss.gipsa-lab.grenobleinp.fr/BOSSRank/. June 21, 2011
[9]
Bas P, Furon T. Bows-2. [Online], available: http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3.tgz. July 21, 2011
[10]
Chang C, Lin C. LIBSVM: a library for support vector ma-chines. [Online], available: http://www.csie.ntu.edu.tw/~cjlin/libsvm. September 16, 2011
[11]
Sharp T. An implementation of key-based digital signal steganography. In: Proceedings of 4th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2001. 13-26
[12]
Yang C, Weng C, Wang S. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensic Security, 2008, 3(3): 488-497
[13]
Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of 12th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2010. 161-177
[14]
Farid H. Detecting hidden messages using higher-order statistical models. In: Proceedings of IEEE International Conference on Image Processing. New York, USA: IEEE, 2002. 905-908
[15]
Xuan G R, Shi Y Q, Gao J H, Zou D K, Yang C Y, Zhang Z P, Chai P Q, Chen C H, Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions. In: Proceedings of 7th International Workshop on Information Hiding. Heidelberg: Springer-Verlag, 2005. 262-277
[16]
Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensic Security, 2010, 5(2): 215-224
[17]
Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV. San Francisco, CA: SPIE, 2013. 86650L
[18]
Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444
[19]
Cho S, Cha B, Wang J, Kuo C C J. Block-based image steganalysis: algorithm and performance evaluation. In: Proceedings of IEEE International Symposium on Circuits and Systems, Piscataway. Paris: IEEE, 2010. 1679-1682
[20]
Xiong G, Ping X, Zhang T, Hou X. Image textural features for steganalysis of spatial domain steganography. Journal of Electronic Imaging, 2012, 21(3): 033015-1-033015-15
[21]
Schaefer G, Stich M. UCID - An Uncompressed Colour Image Database, Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K, 2003