[1] PETITCOLAS A P. MP3Stego 1.1.16[EB/OL].[2014-03-19]. http://www.cl.cam.ac.uk/-fapp2/steganography/mp3stego. [2] WAN W, ZHAO X, HUANG W,et al. Steganalysis of MP3Stego based on Huffman table distribution and recoding[J]. Journal of Graduate University of Chinese Academy of Sciences, 2012,29(1):118-124.(万威,赵险峰,黄炜,等. 基于码表分布特征和重编码的MP3Stego隐写分析[J].中国科学院研究生院学报,2012,29(1):118-124.) [3] FRIDRICH J. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes[C]//Proceedings of the 6th International Conference on Information Hiding. Berlin: Springer, 2004:67-81. [4] ASAD M, GILANI J, KHALID A. An enhanced least significant bit modification technique for audio steganography[C]//Proceedings of the 2011 International Conference on Computer Networks and Information Technology. Piscataway: IEEE, 2011:143-147. [5] LIU F, LIU J, LUO X. Digital image steganalysis[M]. Beijing: China Machine Press, 2010:32-38.(刘芬林,刘久芬,罗向阳.数字图像隐写分析[M].北京:机械工业出版社, 2010:32-38.) [6] BALLESTEROS L D M, MORENO A J M. Highly transparent steganography model of speech signals using efficient wavelet masking[J]. Expert Systems with Applications, 2012,39(10):9141-9149. [7] CVEJIC N, SEPPANEN T. A wavelet domain LSB insertion algorithm for high capacity audio steganography[C]//Proceedings of the IEEE Digital Signal Processing Workshop. Piscataway: IEEE, 2002:53-55. [8] LIU X, GUO L, QIU T. A modified multi-resolutional LSB insertion algorithm for high capacity audio steganography[J]. Computer Engineering and Applications, 2006,42(30):23-24.(刘秀娟,郭立,邱天.改进的大容量多分辨率LSB音频隐写算法[J].计算机工程与应用,2006,42(30):23-24.) [9] ZAMANI M, MANAF A, AHMAD R B, et al. A secure audio steganography approach[C]//Proceedings of the 2009 Internet Technology and Secured Transactions. Piscataway: IEEE, 2009:1-6. [10] WESTFELD A. F5-a steganographic algorithm[M]. MOSKOWITZ I S, edited. Information Hiding, LNCS 2137. Berlin: Springer, 2001:289-302. [11] HUYNH B D, NGUYER X H. An improved technique for hiding data in audio[C]//Proceedings of the 2014 4th International Conference on Digital Information and Communication Technology and it's Applications. Piscataway: IEEE, 2014:149-153. [12] ZHANG S. The research of MP3 self-embedding method[D]. Hefei: University of Science and Technology of China, 2009.(张嵩.音频MP3的自嵌入方法研究[D].合肥:中国科学技术大学,2009.) [13] LIAO X, XIAO D, CHEN Y, et al. Theory and applications of chaotic cryptography[M]. Beijing: Science Press, 2009:11.(廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009:11.) [14] DITTMANNA J, HESSE D. Network based intrusion detection to detect steganographic communication channels: on the example of audio data[C]//Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing. Piscataway: IEEE, 2004:343-346. |