[1]PEVNY T, FILLER T, BAS P. Using high-dimensional image models to perform highly undetectable steganography [C]// Proceedings of International Workshop on Information Hiding, LNCS 6387. Berlin: Springer, 2010:161-177. [2]WESTFELD A. F5- A steganographic algorithm- High capacity despite better steganalysis [C]// Proceedings of the 4th International Workshop on Information Hiding, LNCS 2137. Berlin: Springer, 2001: 289-302.[3]PROVOS N. Defending against statistical steganalysis [C]// Proceedings of the 10th USENIX Security Symposium. Berkley: USENIX Association, 2001: 323-335.[4]SALLE P. Model-based steganography [C]// Proceedings of International Workshop on Digital Watermarking, LNCS 2939. Berlin: Springer, 2004: 154-167.[5]SALE P. Model-based methods for steganography and steganalysis [J]. International Journal of Image Graphics, 2005, 5(1): 167-190.[6]LIN Q, SUNG A, QIAO M. Neighboring joint density-based JPEG steganalysis [J]. ACM Transactions on Intelligent Systems and Technology, 2011, 2(2): article no. 16.[7]XUAN G, SHI Y, HUANG C. Steganalysis using high-dimensional features derived from co-occurrence matrix and class-wise non principal components analysis (CNPCA) [C]// Proceedings of International Workshop on Digital Watermarking, LNCS 4283. Berlin: Springer, 2006: 49-60.[8]PEVNY T, FRIDRICH J. Merging Markov and DCT features for multi-class JPEG steganalysis [C]// Proceedings of the SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007, SPIE 6505. [S.l.]: SPIE, 2007: 650503-1-13.[9]HUANG F, HUANG J. Calibration based universal JPEG steganalysis [J]. Science in China Series F: Information Sciences, 2009, 52(2): 260-268. [10]PEVNY T, BAS P, FRIDRICH J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.[11]Agent Technology Center. BOSS [EB/OL].[2011-10-12]. http://www.agents.cz/boss/BOSSFinal/. |