[1] Ker A. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444. [2] Kwan M. Gifshuffle2.0 .(1998) . http://www.darkside.com.au/gifshuffle/. [3] Machado R. EzStego (1996) . http://www.stego.com/. [4] Fridrich J, Golian M. A new steganographic methods for palette-based images //Proc IS & TPICS Conference. 1999: 285-289. [5] Fridrich J, Du R. Secure steganographic methods for palette images //Proc 3rd Information Hiding Workshop(IH'99). LNCS, 2000, 1768: 47-60. [6] Wu M, Ho Y, Li J. An iterative method of palette-based image steganography[J]. Pattern Recognition Letters, 2004, 25(33): 301-309. [7] Zhang X, Wang S. Analysis of parity assignment steganography in palette images //Proc Knowledge-Based Intelligent Information and Engineering Systems. LNCS, 2005, 3683: 1025-1031. [8] Kong X, Wang Z, You X. Steganalysis of palette images: attack optimal parity assignment algorithm //Proc 5th Inernational Conference on Information Communications and Signal Processing. 2005: 860-864. [9] Lyu S, Farid H. Detecting hidden messages using higher-order statistics and support vector machines //Proc 5th Information Hiding Workshop(IH'03). LNCS, 2003, 2578: 340-354. [10] Liu Z G, Ping L D, Shi L, et al. Steganalysis based on sum of distances[J]. Journal of Image and Graphics, 2009, 14(2):267-274(in Chinese). 刘祖根,平玲娣,史烈,等. 基于距离和的隐写分析[J]. 中国图像图形学报, 2009, 14(2): 267-274. [11] Xuan G, Shi Y, Gao J. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions //Proc Information Hiding Workshop(IH'05). LNCS, 2005, 3727: 262-277. [12] 比彻姆 K(美). 沃尔什函数及其应用[M]. 常迥,译. 北京: 科学出版社, 1980. [13] Chang C, Lin C. LibSVM 3.0 . . http://www.csie.ntu.edu.tw/cjlin/. |