Kong X W, Liu W F, You X G. Secret message location steganalysis based on local coherences of Hue [C]// Proceedings of the Advances in Multimedia Information Processing. Berlin: Springer-Verlag, 2005:301-311. [DOI: 10.1007/11582267_27]
[2]
Pevn? T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography [C]// Proceedings of the 12th International Workshop on Information Hiding. Berlin: Springer-Verlag, 2010:161-177. [DOI: 10.1007/978-3-642-16435-4_13]
[3]
Holub V, Fridrich J. Designing steganographic distortion using directional filters [C]// Proceedings of the 4th IEEE International Workshop on Information Forensics and Security. Washington DC: IEEE Computer Society, 2012:234-239. [DOI: 10.1109/WIFS.2012.6412655]
[4]
Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain [J]. EURASIP Journal on Information Security, 2014:1-13. [DOI: 10.1186/1687-417X-2014-1]
[5]
Lyu S, Fraid H. Steganalysis using color wavelet statistics and one-class support vector machines [C]// SPIE Symposium on Electronic Imaging. San Jose, CA, Bellingham: SPIE Press, 2004:35-45. [DOI: 10.1117/12.526012]
[6]
Sun W Y, Liu T T, Zhang X P, et al. Statistical features for universal steganalysis on color images [J]. Journal of Image and Graphics, 2008, 13(10):1914-1917. [孙文?, 刘婷婷, 张新鹏,等. 彩色图像通用隐写分析的多类统计特征[J]. 中国图象图形学报, 2008, 13(10):1914-1917.] [DOI: 10.11834/jig.20081024]
[7]
Qi K, Xie D Q. Steganalysis of color images based on noise model and channels integration [J]. Journal of Computer Research and Development, 2013, 50(2):307-318. [綦科, 谢冬青. 基于噪声模型和通道融合的彩色图像隐写分析[J]. 计算机研究与发展, 2013, 50(2):307-318.]
[8]
Li F Y, Zhang X P, Yu J. Steganalysis for color JPEG images based on ensemble proportion training [J]. Journal of Electronics & Information Technology, 2014, 36(1):114-120. [栗风永, 张新鹏, 余江. 结合集成比例训练的彩色JPEG图像隐写分析[J]. 电子与信息学报, 2014, 36(1):114-120.] [DOI: 10.3724/SP.J.1146.2013.00443]
[9]
Kittler J, Hatef M, Duin R, et al. On combining classifiers [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(3):226-239. [DOI: 10.1109/34.667881]
[10]
Chang C, Lin C. LIBSVM: a library for support vector machines [EB/OL]. 2012-03-02[2014-10-19]. http://www.csie.ntu.edu.tw/ cjlin/~libsvm.
[11]
Kodovsk? J, Fridrich J, Holub V. Ensemble classifier for steganalysis of digital media [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444. [DOI: 10.1109/TIFS.2011.2175919]
[12]
Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):215-224. [DOI: 10.1109/TIFS.2010.2045842]
[13]
Zhou Z H, Wu J, Tang W. Ensemble neural networks: many could be better than all [J]. Artificial Intelligence, 2002, 137(1-2):239-263. [DOI: 10.1016/S0004-3702(02) 00190-X]
[14]
United States Department of Agriculture. Nature resources conservation service photo gallery [EB/OL]. 2011-07-03[2014-10-19]. http://photogallery.nrcs.usda.gov/. 2010.
[15]
Li F Y, Zhang X P, Cheng H, et al. Digital image steganalysis based on local textural features and double dimensionality reduction [J/OL]. Security and Communication Networks. [2014-12-8]. http://Onlinelibary.wiley.com/doi/10.1002/sec.1094/full. [DOI: 10.1002/SEC.1094]
[16]
Holub V, Fridrich J. Random projections of residuals for digital image steganalysis [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12):1996-2006.
[17]
Lee K, Jung C H, Lee S J, et al. Color cube analysis for detection of LSB steganography in RGB color images [C]// Proceedings of the Computational Science and Its Applications. Berlin: Springer-Verlag, 2005:537-546. [DOI: 10.1007/11424826_57]
[18]
Ker A D. Improved detection of LSB steganography in grayscale images [C]// Proceedings of the 6th International Workshop on Information Hiding. Berlin: Springer-Verlag, 2004:97-115. [DOI: 10.1007/978-3-540-30114-1_8]
[19]
Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction [J]. IEEE Signal Processing Letters, 2006, 10(11):781-783. [DOI: 10.1109/LCOMM.2006.060863]
[20]
Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensic and Security, 2010, 5(2):201-214. [DOI: 10.1109/TIFS.2010.2041812]