Ross Anderson.Why information security is hard—an economic perspective.Proceedings of 17th Annual Computer Security Applications Conference.Washington,DC:IEEE Press,2001.39-40.
毛家发,钮心忻,杨义先,时书剑.基于JPEG净图定量描述的隐写分析方法[J].电子学报,2011,39(8):1907-1912. Mao Jia-fa,Niu Xin-xin,YANGYi-xian,Shi Shu-jia.Steganalysis method based on JPEG cover image quantitative describing [J].Acta Electronica Sinica,2011,39(8):1907-1912.(in Chinese)
[4]
Sullivan K,Madhow U,Chandrasekaran S,et al.Steganalysis for Markov cover data with applications to images [J].IEEE Transactions on Information Forensics and Security,2006,1(2):275-287.
[5]
张湛,瞿芳,刘光杰等.基于高阶Markov链模型的数字图像隐写安全性评估方法[J].信息与控制,2010,39(4):455-461. Zhang Zhan,Qu Fang,Liu Guangjie,et al.A novel security evaluation method for digital image steganography based on high-order Markov chain model [J].Information and Control,2010,39(4):455-461.(in Chinese)
[6]
Pevn y T,J Fridrich.Benchmarking for steganography.Proceedings of the 10th Information Hiding International Workshop.Berlin:Springer Verlag,2008.251-267.
[7]
Xie Weixin,Bedrosian S D.Information measure for fuzzy sets [J].IEEE Transactions on System,Man and Cybernetics,1984,14(1):151-156.
[8]
胡为,胡静涛.加权模糊相对熵在电机转子故障模糊识别中的应用[J].信息与控制,2009,38(3):326-329. Hu Wei,Hu Jingtao.Application of weighted fuzzy relative entropy to fuzzy recognition of motor rotor fault [J].Information and Control,2009,38(3):326-329.(in Chinese)
[9]
Sharp T.An implementation of key-based digital signal steganography [J].Proceedings of Information Hiding Workshop,2001,2137:13-26.
[10]
王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263. Wang Shuo-Zhong,Zhang Xin-Peng,Zhang Wei-Ming.Recent advances in image-based steganalysis research [J].Chinese Journal of Computers,2009,32(7):1247-1263.(in Chinese)
[11]
Cachin C.An information-theoretic model for Steganography [J].Information and Computation,2004,192(1):41-56.
[12]
张湛,刘光杰,王俊文等.基于图像高阶Markov链模型的扩频隐写分析[J].电子学报,2010,38(11):2578-2584. Zhang Zhan,Liu Guangjie,Wang Junwen,et al.Steganalysis of spread spectrum image steganography based on high-order Markov chain model [J].Acta Electronica Sinica,2010,38(11):2578-2584.(in Chinese)
[13]
王维琼.模糊信息度量的拓展及应用.西北大学,2005.7-10. Wang Weiqiong.Expansion and application of the fuzzy information measure.Northwest University,2005.7-10.(in Chinese)
[14]
戴跃伟,刘光杰,叶曙光.基于Hilbert填充曲线的自适应隐写[J].电子学报,2008,36(12A):35-38. Dai Yuewei,Liu Guangjie,Ye Shuguang.Adaptive steganography based on Hilbert filling curve [J].Acta Electronica Sinica,2008,36(12A):35-38.(in Chinese)
[15]
United States Department of Agriculture,Natural resources conservation service photo gallery. http://photo gallery.nrcs.usda.gov,2002.
[16]
BOWS-2 database of 10,000 watermarked images.http://bows2.gipsa-lab.inpg.fr/BOWS2Image DataBase.tgz.2008.
[17]
Xuan G,Shi Y,Gao J,et al.Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions [J].Computer Science,2005,3727:262-265.