Harmsen J,Pearlman W. Steganalysis of additive noise modelable information hiding[C]//Proceedings of SPIE.Bellingham, WA: Society of Photo-Optical Instrumentation Engineers, 2003,5020: 131-142.
[2]
Ker A D. Steganalysis of LSB matching in grayscaleimages[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
[3]
Zhang J, Cox I J, Do?rr G.Steganalysis for LSB matching in images with high-frequency noise[C]//Proceedings of IEEE the 9th Workshop on Multimedia Signal Processing.Piscataway, NJ: IEEE, 2007, 385-388.
[4]
Penvny T, Bas P,Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensics and Security V, 2010, 5(2): 215-224.
[5]
Chang C,Lin C. LIBSVM: a library of support vector machine[J]. ACM Transcations on Intelligent Systems and Technology, 2011, 2(3): 209-234.
[6]
Fu D, Shi Y Q,Su W. A generalized Benford\'s law for JPEG coefficients and its applications in image forensics[C]//Proceedings of SPIE.Bellingham, WA: Society of Photo-Optical Instrumentation Engineers, 2007, 6505: 1-11.
[7]
Zhang T, Li W X, Zhang Y, et al.Steganalysis of LSB matching based on statistical modeling of pixel difference distributions[J]. Information Sciences, 2010, 180(23): 4685-4694.
Pevny T,Fridrich J. Detection of double-compression in JPEG images for applications in steganography[J]. IEEE Transactions on Information Security and Forensics, 2008, 3(2): 91-110.
[10]
Fan Z G,Queiroz R L de. Identification of bitmap compression history: JPEG detection and quantizerestimation[J]. IEEE Transactions on Image Processing, 2003, 12(2): 230-235.