[1] QIAN Y,DONG J,WANG W,et al. Deep learning for steganalysis via convolutional neural networks[C]//Proceedings of the 2015 SPIE-Media Watermarking, Security, and Forensics. Bellingham, WA:SPIE, 2015:No. 94090J. [2] KRAETZER C,DITTMANN J. Mel-cepstrum based steganalysis for VoIP steganography[C]//Proceedings of the SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX. Bellingham,WA:SPIE,2007:No. 650505. [3] LIU Q,SUNG A H,QIAO M. Temporal derivative-based spectrum and Mel-cepstrum audio steganalysis[J]. IEEE Transactions on Information Forensics and Security,2009,4(3):359-368. [4] LIU Q,SUNG A H,QIAO M. Derivative-based audio steganalysis[J]. ACM Transactions on Multimedia Computing, Communications,and Applications,2011,7(3):No. 18. [5] LUO W,LI H,YAN Q,et al. Improved audio steganalytic feature and its applications in audio forensics[J]. ACM Transactions on Multimedia Computing,Communications,and Applications,2018, 14(2):No. 43. [6] KODOVSKY J,FRIDRICH J,HOLUB V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security,2012,7(2):432-444. [7] PAULIN C,SELOUANI S A,HERVET É. Audio steganalysis using deep belief networks[J]. International Journal of Speech Technology,2016,19(3):585-591. [8] CHEN B,LUO W,LI H. Audio steganalysis with convolutional neural network[C]//Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM, 2017:85-90. [9] LIN Y,WANG R,YAN D,et al. Audio steganalysis with improved convolutional neural network[C]//Proceedings of the 7th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2019:210-215. [10] LIN Z,HUANG Y,WANG J. RNN-SM:fast steganalysis of VoIP streams using recurrent neural network[J]. IEEE Transactions on Information Forensics and Security,2018,13(7):1854-1868. [11] YANG H,YANG Z,HUANG Y. Steganalysis of VoIP streams with CNN-LSTM network[C]//Proceedings of the 7th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2019:204-209. [12] WANG Y,YANG K,YI X,et al. CNN-based steganalysis of MP3 steganography in the entropy code domain[C]//Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM,2018:55-65. [13] REN Y,LIU D,XIONG Q,et al. Spec-ResNet:a general audio steganalysis scheme based on deep residual network of spectrogram[EB/OL].[2020-03-26]. https://arxiv.org/pdf/1901.06838.pdf. [14] FRIDRICH J,KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security,2012,7(3):868-882. [15] YE J,NI J,YI Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security,2017,12(11):2545-2557. [16] HE K,ZHANG X,REN S,et al. Deep residual learning for image recognition[C]//Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE, 2016:770-778. [17] 郭继昌, 何艳红, 魏慧文. 利用模块化残差网络的图像隐写分析[J]. 西安电子科技大学学报,2019,46(1):79-85.(GUO J C,HE Y H,WEI H W. Image steganalysis on the modularized residual network[J]. Journal of Xidian University,2019,46(1):79-85.) [18] BOROUMAND M, CHEN M, FRIDRICD J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security,2019,14(5):1181-1193. [19] HUANG J,NI J,WAN L,et al. A customized convolutional neural network with low model complexity for JPEG steganalysis[C]//Proceedings of the 7th ACM Workshop on Information Hiding and Multimedia Security. New York:ACM, 2019:198-203. [20] GAROFOLO J S,LAMEL L F,FISHER W M,et al. TIMIT acoustic continuous speech corpus[EB/OL].[2020-03-26]. https://catalog.ldc.upenn.edu/LDC93S1. [21] REPP H. Hide4PGP V2.0[EB/OL].[2020-03-10]. http://www.heinz-repp.onlinehome.de/Hide4PGP.htm. [22] MIELIKAINEN J. LSB matching revisited[J]. IEEE Signal Processing Letters,2006,13(5):285-287. |