Dumitrescu S and Wu Xiaolin. A new framework of LSBsteganalysis of digital media [J].IEEE Trans. on SignalProcessing.2005, 53(10):3936-3947[2]Ker A D. Derivation of error distribution in least squaressteganalysis [J].IEEE Trans. on Information Forensics andSecurity.2007, 2(2):140-148[3]詹双环, 张鸿宾. 基于小波分解和方差分析的图像信息隐藏盲检测[J].电子与信息学报.2007, 29(6):1460-1463浏览[4]田源, 程义民, 王以孝. 一种新的数据隐藏方法[J]. 电子学报,2004, 32(9): 1444-1447.Tian Yuan, Cheng Yi-min, and Wang Yi-Xiao. A novelmethod of data hiding [J]. Acta Electronica Sinica, 2004,32(9): 1444-1447.[5]程义民, 钱振兴, 王以孝, 等. 基于数位信息的信息隐藏方法[J].电子与信息学报.2005, 27(8):1304-1309浏览[6]Dumitrescu S, Wu Xiallin, and Wang Zhe. Detection of LSBsteganography via sample pair analysis [J].IEEE Trans. onSignal Processing.2003, 51(7):1995-2007[7]Yu Xiao-yi, Tan Tie-niu, and Wang Yun-hong. Extendedoptimization method of LSB steganalysis [C]. IEEEInternational Conference on Image Processing 2005. Genova,Italy, 2005(II): 1102-1105.[8]Ker A D. Steganalysis of embedding in two least-significantbits [J].IEEE Trans. on Information and Security.2007, 2(1):46-54[9]Huang Hesu and Kyriakakis C. Blind dereverberation ofaudio signals using a modified constant modulus algorithm[C]. 121st Audio Engineering Society. San Francisco, CA, US,2006: 6974-6977.[10]史晓非, 刘人杰, 苗瑞. 一种峭度依赖的参数自适应盲分离算法电子与信息学报. 2006, 28(11): 2033-2036.Shi Xiao-fei, Liu Ren-jie, and Miao Rui. A parameterkurtosis-dependent flexible BSS algorithm [J].. Journal ofElectronics Information Technology.2006, 28(11):2033-2036[11]Johnson M K, Lyu S, and Farid H. Steganalysis of recordedspeech [C]. SPIE Symposium on Electronic Imaging. San Jose,CA, US, 2005: 664-672.
|