[1] Fridrich J, Filler T. Practical Methods for Minimizing Embedding Impact in Steganography [C]//Proceedings of the SPIE: 6505. Bellingham: SPIE, 2007: 650502-650515.
[2] Filler T, Judas J, Fridrich J. Minimizing Additive Distortion in Steganography Using Syndrome-trellis Codes [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935.
[3] Filler T, Judas J, Fridrich J. Minimizing Embedding Impact in Steganography using Trellis-coded Quantization[C]//Proceedings of the SPIE: 7541. Bellingham, SPIE, 2010: 754105-754114.
[4] Filler T, Fridrich J. Minimizing Additive Distortion Functions With Non-binary Embedding Operation in Steganography [C]//Proceedings of 2nd IEEE Workshop on Information Forensics and Security. Piscataway, IEEE, 2010: 1-6.
[5] Kerckhoffs A. La Cryptographie Militaire [J]. Journal des Sciences Militaires, 1883, Ⅸ(1): 5-38.
[6] Schottle P, Bohme R. A Game-theoretic Approach to Content-adaptive Steganography[C]//Proceedings of the 14th Infernational Conference on Information Hiding. Berlin: Springer Verlag, 2013: 125-141.
[7] Johnson B, Schottle P, Bohme R. Where to Hide the Bits[C]//Proceedings of the 3rd International Conference on Decision and Game Theory for Security. Berlin: Springer, 2012: 1-17.
[8] Schoettle P, Laszka A, Johnson B, et al. A Game-theoretic Analysis of Content-adaptive Steganography with Independent Embedding[C]//Proceedings of the 21st Europhean Signal Processing Conference. Piscataway: IEEE, 2013.
[9] 汪贤裕, 肖玉明. 博弈论及其应用[M]. 北京: 科学出版社, 2008.
[10] Fridrich J. On the Role of Side Information in Steganography in Empirical Covers [C]//Proceedings of the SPIE: 8665. Bellingham: SPIE, 2013: 866501-866511.
[11] 李军, 潘峰, 杨晓元, 等. 小波域最小嵌入失真函数设计及其在隐写中的应用[J]. 中国图象图形学报, 2012, 17(8): 946-952
Li Jun, Pan Feng, Yang Xiaoyuan, et al. Desing of Minimizing Embedding Impact Function in DWT Domain and Its Application in Steganography[J]. Journal of Image and Graphics, 2012, 17(8): 946-952
[12] Fridrich J, Golian M, Soukal D. Wet Paper Codes with Improved Embedding Efficiency[J]. IEEE Transactions on Information Forensics and Security, 2006(1): 102-110.
[13] Schaefer G, Stich M. UCID—an Uncompressed Colour Image Database [R]. Nottingham: School of Computing and Mathematics, Nottingham Trent University, 2003.
[14] Farid H. Detecting Steganographic Messages in Digital Images [R]. TR2001-412, Hanover: Dartmouth College, 2001.
[15] 王祥, 李可, 付凯元, 等. 直方图平移的自适应大容量可逆水印算法[J]. 西安电子科技大学学报, 2014, 41(1): 124-129.
Wang Xiang, Li Ke, Fu Kaiyuan, et al. Histogram Shifting Based Adaptive Reversible Watermarking Algorithm with a High Capacity[J]. Journal of Xidian University, 2014, 41(1): 124-129.
[16] Pevny T, Filler T, Bas P. Using High-dimensional Image Models to Perform Highly Undetectable Steganography[C]//Proceedings of the 12th International Workshop on Information Hiding: 6387. Berlin: Springer Verlag, 2010: 161-177.
[17] Pevny T, Bas P, Fridrich J. Steganalysis by Subtractive Pixel Adjacency Matrix [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 215-224.
[18] Ker A D, Bas P, Bohme R,et al. Moving Steganography and Steganalysis from the Laboratory into the Real Word[C]//Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. Londong: ACM, 2013: 45-58. |