Simmons G J.The prisoner''s problem and the subliminal channel[A].Advances in Cryptography:Proceedings of CRYPTO''83[C].London:Plenum Press,1983.51-67.
[2]
Cachin C.An information-theoretic model for steganography[A].Information Hiding:Second International Workshop,vol.1525 of Lecture Notes in Computer Science[C].Portland,Oregon,U.S.A:Springer-Verlag Press,1998.306-318.
[3]
J Fridrich,R Du,M Long.Steganalysis of LSB encoding in colof image[A].Proceeding of IEEE International Conference on Multimedia and Expo[C].New York,USA:IEEE Press,2000.1279-1282.
[4]
J Fridrich,M Goljan,D Hogea.Steganalysis of JPEG images:Breaking the F5 algorithm[A].Proceeding of 5th Information Hiding Workshop LNCS vol.2578[C].New York:Springer Verlag Press,2002.310-323.
[5]
J Fridrich,M Goljan,D Hogea.Attacking the OutGuess[A].Proceeding of the ACM Workshop on Multimedia and Security 2002[C].Juan-les-Pins,France:ACM Press,2002.3-6.
[6]
Haay Farid.Detecting Steganographic Messages in Digital Images[R].USA:Dartmouth College,Computer Science,1999.TR2001-412.
[7]
Joon-Hyuk Chang.Image probability distribution based on generalized Gamma function[J].IEEE Signal Processing Letters,2005,12(4):325-328.
[8]
Walton S.Image authentication for a slippery new age[Z].Dr.Dobb''s J Software Tools Profess Program,1995.18-26.
[9]
Rainer B,Andreas Westfeld.Breaking Cauchy model-based JPEG steganography with first order statistics[A].Computer Security(ESORICS 2004),LNCS 3193[C].Sophia Antipolis,France:Springer Verlag,2004.125-140.
[10]
Sorina Dumitrescu.Detection of LSB steganography via sampie pair analysis[A] Proc of the 5th International Workshop on Information Hiding,LCNS 2578[C].New York:SpringerVerlag,2002.55-372.
[11]
Jessica Fridrich.On estimation of secret message length in LSB steganography in spatial domain[A].Security,Steganography,and Watermarking of Multimedia Contents[C].Saint Joey,USA:SPIE Press,2004.23-34.
R Chu,X You,X Kong.A DCT-based image steganographic method resisting statistical attacks[A].The 2004 IEEE International Conference on Acoustics,Speech,and Signal Processing[C].Montreal,Canada:Springer-Verlag Press,2004.953-956.
[15]
Phil Sallee.Model-based steganography[A].International Workshop on Digital Watermarking[C].Seoul,Korea:Springer-Verlag Press,2003.154-167.
[16]
A Westfeld,A Pfitzmann.Attacks on steganographic systems:Breaking the steganographic utilities EzStego,Jsteg,Stegnos,and S-tools-and some lessons learned[A].The 3rd Information Hiding Workshop,Lecture Notes in Computer Science 1768[C].New York:Springer-Verlag Press,2000.61-76.
[17]
刘畅.针对信息隐藏的数字图像数据特性研究[D].辽宁大连:大连理工大学,2002.
[18]
J Fridrich.Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[A].International Workshop on Information Hiding[C].Toronto(CA):Springer Verlag Press,2004.67-81.
Edmund Y Lam,Joseph W Goodman.A mathematical analysis of the DCT coefficient distributions for images[J].IEEE Transactions on Image Processing,2000,9(10):1661-1666.