Provos N,Honeyman P.Hide and seek:An introduction to steganography[J].IEEE Security & Privacy,2003,1 (3):32 ~ 44.
[2]
Fridrich J,Goljan M,Du Rui.Detecting LSB steganography in color and gray-scale images[J].Magazine of IEEE Multimedia,Special Issue on Security,2001,8(4):22 ~28.
[3]
ZHANG Tao,PING Xi-jian.Reliable detection of LSB steganography based on the difference image histogram[A].In:Proceedings of International Conference Asian Symposium Signal Processing[C],Hong Kong,China,2003:545 ~ 548.
[4]
Lyu S,Farid H.Detecting hidden messages using higher-order statistics and support vector machines[A].In:Petitcolas et al.(Eds.).Proceedings of 5th International Workshop on Information Hiding[C],Noordwijkerhout,the Netherlands:Springer-Verlag,2002:340 ~ 354.
[5]
BIAN Zhao-qi,ZHANG Xue-gong.Pattern recognition(2nd edition)[M].Beijing:Tsinghua University Press,2000.[边肇棋,张学工等编著.模式识别(第二版)[M].北京:清华大学出版社,2000.]
[6]
Romana Machado.EZStego[EB/OL].Http://www.stego.com.
[7]
Fridrich J,Goljan M.Practical steganalysis-state of the art[A].In:Proceedings of SPIE Photonics West,Electronic Imaging 2002 on Security and Watermarking of Multimedia Contents[C],San Jose,California,USA.2002:1 ~13.
[8]
Westfeld A,Pfitzmann A.Attacks on steganographic systems[A].In:Pfitzmann A.(Eds.).Proceedings of 3rd Int\'l Workshop Information Hiding[C].Dresden,Germany,Springer-Verlag,1999:61 ~ 76.
[9]
Farid H.Detecting hidden messages using higher-order statistical models[A].In:Billene Mercer(Ed.).Proceedings of International Conference Image Processing[C],Rochester,NY,USA:IEEE Press,2002:905 ~ 908.
[10]
REN Ruo-en,WANG Hui-wen.Multiple statistical data analysistheory,technique,and instance[M].Beijing:National Defence and Industry Press,1997.[任若恩,王惠文著.多元统计数据分析--理论、方法、实例[M].北京:国防工业出版社,1997.]