PARK T H,HAN J G,EOM I K.Steganalysis of content-adaptive steganography using Markov features for DCT coefficients[J].Journal of the Institute of Electronics and Information Engineers,2015,52(8):97-105.
[2]
MUNGMODE S,SEDAMKAR R R,KULKARNI N.A modified high frequency adaptive security approach using steganography for region selection based on threshold value[J].Procedia Computer Science,2016,79:912-921.DOI:10.1016/j.procs.2016.03.114.
[3]
GUO L,NI J,SHI Y Q.Uniform embedding for efficient JPEG steganography[J].IEEE Transactions on Information Forensics and Security,2014,9(5):814-825.
[4]
BARALDI A,PARMIGGIANI F.An investigation of the textural characteristics associated with gray level cooccurrence matrix statistical parameters[J].IEEE Transactions on Geoscience and Remote Sensing,1995,33(2):293-304.
[5]
KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble classifiers for steganalysis of digital media[J].IEEE Transactions on Information Forensics&Security,2012,7(2):432-444.
[6]
ZHANG W,LI S.A coding problem in steganography[J].Designs,Codes and Cryptography,2008,46(1):67-81.
[7]
WESTFELD A.F5—A steganographic algorithm[C]//International Workshop on Information Hiding.Berlin:Springer,2001:289-302.
[8]
PEVNY T,FILLER T,BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding.Berlin:Springer-Verlag,2010:161-177.
[9]
PEVNY T,BAS P,FRIDRICH J.Steganalysis by subtractive pixel adjacency matrix[J].IEEE Transactions on Information Forensics and Security,2010,5(2):215-224.
[10]
韩涛,祝跃飞.基于Canny边缘检测的自适应空域隐写术[J].电子与信息学报,2015,37(5):1266-1270.DOI:10.11999/JEIT141121.HAN T,ZHU Y F.Adaptive spatial steganography based on Canny’s edge detection[J].Journal of Electronics&Information Technology,2015,37(5):1266-1270.DOI:10.11999/JEIT141121(Ch).
奚玲,平西建,张涛.一种新的湿纸码自适应信息隐藏方法[J].应用科学学报,2010,28(5):485-492.XI L,PING X J,ZHANG T.A new adaptive steganography using wet paper code[J].Journal of Applied Sciences,2010,28(5):485-492(Ch).
[13]
FRIDRICH J,PEVNY T,KODOVSKY J.Statistically undetectable jpeg steganography:Dead ends challenges,and opportunities[C]//Proceedings of the 9th Workshop on Multimedia&Security.New York:ACM,2007:3-14.
[14]
FILLER T,JUDAS J,FRIDRICH J.Minimizing additive distortion in steganography using syndrome-trellis codes[J].IEEE Transactions on Information Forensics and Security,2011,6(3):920-935.
[15]
WANG C,NI J.Design of Adaptive Steganographic Schenes for Digital Images[DB/OL].[2016-02-02].http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=731809.
[16]
FRIDRICH J,FRIDRICH J.Steganalysis of JPEG Images Using Rich Models[DB/OL].[2016-04-02].http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1284476.
[17]
SCHAEFER G,STICH M.UCID:An Uncompressed Color Image Database[DB/OL].[2016-03-02].http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=837905.
[18]
SALLEE P.Model-based methods for steganography and steganalysis[J].International Journal of Image and Graphics,2005,5(1):167-189.
[19]
FARINHA T,FONSECA I,SIMOES A,et al.Minimizing embedding impact in steganography using trellis-coded quantization[J].Proceedings of SPIE-The International Society for Optical Engineering,2010,6(1):175-178.
[20]
SEDIGHI V,COGRANNE R,FRIDRICH J.Content-adaptive steganography by minimizing statistical detectability[J].IEEE Transactions on Information Forensics and Security,2016,11(2):221-234.