Filler T, Judas J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935. [DOI: 10. 1109/TIFS. 2011. 2134094]
[2]
Kim Y, Duric Z, Richards D. Modified matrix encoding technique for minimal distortion steganography [C]// Proceedings of the 8th Information Hiding International Workshop. Berlin: Springer-Verlag, 2006: 314-327. [DOI: 10. 1007/978-3-540-74124-4_21]
[3]
Sachnev V, Kim H J, Zhang R. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding [C]// Proceedings of the 11th ACM Multimedia & Security Workshop. New York: ACM Press, 2009:131-140. [DOI: 10. 1145/1597817. 1597841]
[4]
Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. [DOI: 10. 1109/TIFS. 2010. 2077629]
[5]
Agaian S S, Sifuentes R R. Adaptive steganography with increased embedding capacity for new generation of steganographic systems [C]// Proceedings of Image Processing: Algorithms and Systems IV. Bellingham: SPIE Press, 2005, 5672: 257-268. [DOI: 10. 1117/12. 588032]
[6]
Lou D C, Wu N I, Wang C M, et al. A novel adaptive steganography based on local complexity and human vision sensitivity[J]. Journal of Systems and Software, 2010, 83(7): 1236-1248. [DOI: 10. 1016/j. jss. 2010. 001. 050]
[7]
Zhang Z, Liu G J, Dai Y W, et al. A self-adaptive image steganography algorithm based on cover-coding and markov model[J]. Journal of Computer Research and Development, 2012, 49(8): 1668-1675. [张湛, 刘光杰, 戴跃伟, 等. 基于隐写编码和Markov模型的自适应图像隐写算法 [J]. 计算机研究与发展, 2012, 49(8): 1668-1675.]
[8]
Filler T, Fridrich J. Design of adaptive steganographic schemes for digital images [C]// Proceedings of Media Watermarking, Security, and Forensics III. Bellingham: SPIE Press, 2011, 7880: 1-14. [DOI: 10. 1117/12. 872192]
[9]
Kodovsky J, Holub V. On dangers of overtraining steganography to incomplete cover model [C]// Proceedings of ACM Multimedia & Security Workshop. New York: ACM Press, 2011: 69-76. [DOI: 10. 1145/2037252. 2037266]
[10]
Kodovsky J, Fridrich J. On completeness of feature spaces in blind steganalysis [C]// Proceedings of the 10th ACM Multimedia & Secutity Workshop. New York: ACM Press, 2008: 123-132. [DOI: 10. 1145/1411328. 1411352]
[11]
Kodovsky J, Fridrich J. Steganalysis of JPEG images using rich models [C]// Proceedings of SPIE Media Watermarking, Security, and Forensics. Bellingham: SPIE Press, 2012, 8303: 1-13. [DOI: 10. 1117/12. 907495]
[12]
Li X C, Zhu S A. A survey of the markov random field method for image segmentation[J]. Journal of Image and Graphics, 2007, 12(5): 789-798. [李旭超, 朱善安. 图像分割中的马尔可夫随机场方法综述[J]. 中国图象图形学报, 2007, 12(5): 789-798.] [DOI: 10. 11834/jig. 20070504]
[13]
Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. [DOI: 10. 1109/TIFS. 2011. 2175919]
[14]
Fridrich J, Kodovsky J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882. [DOI: 10. 1109/TIFS. 2012. 219040 2]
[15]
Holub V, Fridrich J, Denemark T. Random projections of residuals as an alternative to co-occurrences in steganalysis [C]// Proceedings of Media Watermarking, Security, and Forensics. Bellingham: SPIE Press, 2013, 8665: 1-11. [DOI: 10. 1117/12. 100 0330]
[16]
Chen C K, Yang J Y. Fisher large margin linear classifier[J]. Journal of Image and Graphics, 2007, 12(12): 2143-2147. [陈才扣, 杨静宇. Fisher大间距线性分类器[J]. 中国图象图形学报, 2007, 12(12): 2143-2147.] [DOI: 10.11834/jig.20071218]
[17]
Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224. [DOI: 10. 1109/TIFS. 2010. 2045842]
[18]
Guan Q X, Dong J, Tan T N. An effective image steganalysie method based on neighborhood information of pixels [C]// Proceedings of 18th IEEE International Conference on Image Processing. Washington: IEEE Computer Society, 2011: 2721-2724. [DOI: 10. 1109/ICIP. 2011. 6116231]
[19]
Nash J. Equilibrium points in n-person games[J]. Proceedings of the National Academy of Sciences of the United States of America, 1950, 36: 48-49.
[20]
Xiong G, Ping X J, Zhang T, et al. Image textural features for steganalysis of spatial domain steganography[J]. Journal of Electronic Imaging, 2012, 21(3), 033015(1-15). [DOI: 10. 1117/1. JEI. 21. 3. 033015]