[1] Luo X Y, Wang D S, Wang P, et al. A review on blind detection for image steganography [J]. Signal Processing, 2008, 88(9): 2138-2157.
[2] Cox I J, Killian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
[3] Marvel L M, Boncelet C G, Retter C T. Spread spectrum image steganography [J]. IEEE Transactions on Image Processing,1999, 8( 8):1075-1082.
[4] Seshadrinathan K, Rahim Sheikh H, Bovik A C. Detecting spread spectrum watermarks using natural scene statiatics //Proceedings of IEEE Int Conf Image Processing II. 2005, Genova: 1106-1109.
[5] Chandramouli R, Subbalakshmi K P. Active steganalysis of spread spectrum image steganography //Proceedings of IEEE International Symposium on Circuits and Systems. Bangkok, Thailand, 2003,3:830-833.
[6] Donescu I, Nguyen E. Combining visual and detection models in spread-spectrum watermarking //Proceedings of 2000 International Conference on Image Processing. Vancouver B C, Canada,2000,3:686-689.
[7] Sullivan K, Madhow U,Chandrasekaran S, et al. Steganalysis of spread spectrum data hiding exploiting cover memory // Proceedings of Security, Steganography, and Watermarking of Multimedia Contents VIi,SPIE 5681, San Jose, Calif, USA, 2005: 38-46.
[8] Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis for Markov cover data with applications to images [J]. IEEE Transactions on Information Forensics and Security,2006,6(22): 275-287.
[9] Wang Y, Moulin P. Steganalysis of block-structured stegotext // Proceeding of SPIE,San Joce CA,2004:5306-5347.
[10] Chen B, Wornell G W. Quantization index modulation:A class of provably good methods for digital watermarkingand information embedding [J]. IEEE Trans Info Theory, 2001,7(4):1423-1443.
|