Romana Machado.EzSteg[CP/OL],available from:http://www.stego.com
[2]
Westfeld A,Pfitzmann A.Attacks on steganographic systems breaking the steganographic utilities ezstego,jsteg,steganos,and S-tools and lessons learned[A].In:Andreas Pfitzmann(Ed.):Procseedings of Information Hiding Third International Workshop[C].Dresden,Germany:Springer-Verlag,1999:61~75.
[3]
Fridrich Jessica,Goljan Miroslav,Du Rui.Reliable detection of LSB steganography in color and grayscaleImages[A].In:Procseedings of ACM Conference on Special Session on Multimedia Security and Watermarking[C],Ottawa,Cannada,2001:27~30.
[4]
Eggers J J,Bauml R,Girod B.A communications approach to image steganography[A].In:Proceedings of SPIE:Electronic Imaging,Security and Watermarking of Multimedia Contents[C],San Jose,California,USA,2002,4675:26~37.
[5]
Fridrich J,Goljan M.Practical stegnanlysis of digital images-state of the art[A].In:Procseedings of SPIE Photonics West[C],San Jose,California,USA,2002:1~13.
[6]
Dixon Wilfrid J,Massey Frank J.Introduction to statistical analysis[M].New York:McGrawHill Book Company,Inc.1957.