Johnson N and Jajodia S. Exploring steganography: seeing the unseen[J]. IEEE Computer, 1998, 31(2): 26-34.[2]Sutaone M S and Khandare M V. Image based steganography using LSB insertion technique[C]. IET International Conference on Wireless, Mobile and Multimedia Networks, Mumbai, India, 2008: 146-151.[3]Noda H, Niimi M, and Kawaguchi E. Steganographic Methods Focusing on BPCS Steganography[M]. Heidelberg: Springer Berlin Publisher, 2007: 189-229.[4]Huang C H, Chuang S C, and Wu J L. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques[J].IEEE Transactions on Multimedia.2008, 10(4):557-569[5]Chen B and Wornell G W. Quantization index modulation methods for digital watermarking and information embedding of multimedia[J].Journal of VLSI Signal Processing.2001, 27(1-2):7-33[6]Lie W N and Lin G S. A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia.2005, 7(6):1007-1020[7]Malik H.[J].Subbalakshmi K P, and Chandramouli R. Steganalysis of QIM-based data hiding using kernel density estimation[C]. Proc. MMSec07. Dallas, Texas, USA.2007,:-[8]Lyu S and Farid H. Detecting hidden messages using higher-order statistics and support vector machines[C]. Proc. IH02. Noordwijkerhout, Netherlands, 2002, LNCS, Vol. 2578: 340-354.[9]Xuan G, Shi Y Q, Gao J, Zou D, Yang C, Zhang Z, Chai P, Chen C, and Chen W. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic function[C]. Proc. IH05, Barcelona, Spain, 2005.LNCS, Vol. 3727: 262-277.[10]Noda H, Niimi M, and Kawaguchi E. Application of QIM with dead zone for histogram preserving JPEG steganography[C]. Proc. ICIP05. Genova, Italy, 2005. Vol. 2: 1082-1085.[11]Solanki K, Sullivan K, Madhow U, Manjunath B S, and Chandrasekaran S. Statistical restoration for robust and secure steganography[C][J].Proc. ICIP05. Genova, Italy.2005, Vol. 2:1118-1121[12]Zhao X F, Xia B B, and Deng Y. Strengthening QIM-based watermarking by non-uniform discrete cosine transform[C][J].Proc. IH08. Santa Barbara, USA.2008, LNCS 5284:309-324[13]Fridrich J, Baldoza A C, and Simart R J. Robust digital watermarking based on key-dependent basis functions[C][J].Proc. IH98. Portland, Oregon, USA.1998, LNCS 1525:143-157[14]Xie L, Zhang J S, and He H J. A novel robust audio watermarking scheme based on nonuniform discrete fourier transform[J]. Chinese Journal of Computers, 2006, 29(9): 1711-1721.[15]Dietl W, Meerwald P, and Uhl A. Protection of wavelet-based watermarking systems using filter parametrization[J].Signal Processing.2003, 83(10):2095-2116
|