Neil F Johnson.Steganography Tools[EB/OL].http://www.jjtc.com/Security/stegtools.htm,2006-05.com/Security/stegtools.htm,2006-05.
[2]
Mielikainen J.LSB matching revisited[J].IEEE Signal Processing Letters,2006,13(5):285 ~ 287.
[3]
Yang B.Modern Cryptology[M].Beijing:Qsinghua University Publishing House,2003:130 ~ 131.[杨波.现代密码学[M].北京:清华大学出版社,2003:130 ~ 131.]
[4]
Tang Song-sheng,Lü Li-ping.An information hiding method based on filling random sequences[J].Computer Engineering and Applications,2005,(30):153~154.[唐松生,吕丽平.一种基于随机序列填充的信息隐藏方法[J].计算机工程与应用,2005,(30):153 ~ 154.]
[5]
Petitcolas F A P,Anderson R J.Evaluation of copyright marking systems[A].In:Proceedings of IEEE Mulitimedia Systems[C],Florence.,Italy,1999:574 ~ 579.