JHNSON N F,JAJODIA S.Exploring steganography:seeing the unseen[J].IEEE Computer,1998,31(2):26-34.
[2]
钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(12A):2421-2424.NIU Xin-xin,YANG Yi-xian.Study on the frame ofinformation steganographu and steganalysis[J].ActaElectronica Sinica,2006,34(12A):2421-2424.(inChinese)
XUAN G,SHI Y Q,GAO J,et al.Steganalysis based onmultiple features formed by statistical moments of waveletcharacteristic functions[C]∥Proceeding informationHiding Workshop.Bacelona:[S.l.],2005:262-277.
[5]
盛骤,谢式千.概率论与数理统计[M].北京:高等教育出版社,1993:185-194.
[6]
GOLJAN M,FRIDRICH J,HOLOTYAK T.New blindsteganalysis and its implocations[C]∥Proc SPIE,Security,Steganography and Watermarking of MultimediaContents VI.San Jose:[S.l.],2006:1-13.
[7]
毛用才,胡奇英.随机过程[M].西安:西安电子科技大学出版社,2000:132-141.
[8]
HARMSEN J J,PEALMAN W A.Steganalysis of additivenoise modelable information hiding[C]∥Proc SPIE,Secruity Steganography,and Watermarking of MultimediaContents VI.San Jose:[S.l.],2003:131-142.
[9]
COX I J,KILLIAN J,LEIGHTON F T,et al.Securespread spectrum watermarking for multimedia[J].IEEETrans Image Process,1997,6(12):1673-1687.
[10]
MARVEL L M,BONCELET C G,RETTER C T.Spreadspectrum image steganography[J].IEEE Trans ImageProcess,1999,8(8):1075-1083.
[11]
SHARP T.An implementation of key-based digital signalsteganography[C]∥Proc 4th Int Workshop onInformation Hiding.Pittsburgh:[S.l.],2001:13-26.
[12]
WANG Y,MOULIN P.Optimized feature extraction forlearning-based image steganalysis[J].IEEE Transactionson Information Forensics and Security,2007,2(1):31-45.
[13]
MONTGOMER D C,RUNGER G C.Applied statisticsand probability for engineers[M].New York:Wiley,1994:18-502.
[14]
DUDA R O,HART P E,STORK D G.Patternclassification[M].2nd ed.,New York:Wiley,2001:30-62.
[15]
EGGERS J J,BAUML R,TZSCHOPPE R,et cl.ScalarCosta scheme for information embedding[J].IEEE TransSignal Process,2003,51(4):1003-1019.