[2]Fridrich J, Goljan M. Practical steganalysis of digital images State of the art[A]. In: Proceedings of SPIE on Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, CA,USA, Jan. 2002,4675:1~13.
[2]
[4]Westfeld A, Pfitzmann A. Attacks on steganographic systems[A]. In: Lecture Notes in Computer Science on Third International Workshop on Information Hiding [C], Berlin Heidelberg German: Springer-Verlag. 1999,1768: 61~ 76.
[3]
[6]Ettinger J. Steganalysis and game equilibria [A]. In: Lecture Notes in Computer Science on Second International Workshop on Information Hiding [C], Berlin Heidelberg German: SpringerVerlag, 1998,1525: 319~328.
[4]
[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding-A Survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
[5]
[3]Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images[J]. Magazine of IEEE Multimedia,Special Issue on Security. 2001,9(4):22~28.
[6]
[5]Provos N, Honeyman P. Detecting Steganographic Content on the Internet [ R ]. Center for Information Technology Integration, University of Michigan, USA, Technical Report.2001: 01~11.
[7]
[7]Provos N. Defending against statistical steganalysis [A]. In:Proceedings 10th Advanced Computing System Association,Security Symposium[EB/OL]. Washington, DC, USA, 2001.http://www. usenix. org/publications/library/proceedings/sec01/provos./html
[8]
[8]Wang S, Zhang X, Zhang K. Steganographic technique capable of withstanding RQP analysis [J]. Journal of Shanghai University (English Edition), 2002,6 (4): 273 ~ 277.