Fridrich J,Goljan M,Soukal D. Perturbed quantization steganography[J]. ACM Multimedia and Security Journal,2005,11(2):98-107.
[2]
Kim Y,Duric Z,Richards D. Modified matrix encoding technique for minimal distortion steganography[C]//Proceedings of the 8th International Conference on Information Hiding. New York:Springer-Verlag Press,2006:314-327.
[3]
Sachnev V,Kim J H,Zhang R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. Princeton,NJ: ACM 2009:131-140.
[4]
Huang F J,Huang J W,Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics and Security, 2012,7(4):1181-1191.
[5]
Filler T,Judas J,Fridrich J. Minimizing embedding impact in steganography using Trellis-coded quantization[C]//Proceedings of SPIE,Media Forensics and Security Ⅻ. San Jose,USA: SPIE, 2010, 7541:7541,5(1-14).
[6]
Filler T,Judas J,Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security,2011,6(3):920-935.
[7]
Filler T,Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010,5(4):705-720.
[8]
Xi L. Research on content based adaptive image steganography[D]. Zhengzhou:The PLA Information Engineering University,2011.[奚玲. 基于内容特征的自适应图像隐写技术研究[D]. 郑州:信息工程大学,2011.]
[9]
Filler T,Pevny T,Bas P. Break our steganography system[EB/OL].2010-07-02[2013-01-08]. http://www.agents.cz/boss.
[10]
Chang C C,Lin C J. LIBSVM:a Library for support vector machines[EB/OL].2012-03-02[2013-01-08]. http://www. csie. ntu.edu.tw/[XC范围号.TIF,JZ]cjlin/libsvm/index.html.
[11]
Kodovsky J,Fridrich J. Cabibration revisited[C]//Proceedings of the 11th ACM Multimedia & Security Workshop. Princeton,NJ: ACM, 2009:63-74.
[12]
Kodovsk? J,Fridrich J,Holub V. On dangers of overtraining steganography to incomplete cover model[C]//Proceedings of the 13th ACM Multimedia & Security Workshop. Niagara Falls,NY: ACM, 2011:29-30.
[13]
Chen C,Shi Y Q. JPEG image steganalysis utilizing both intrablock and interblock correlations[C]//IEEE International Symposium on Circuits and Systems. Seattle,WA: IEEE, 2008:18-21.