References
1. FARID H. Detecting Hidden Messages Using Higher-Order Statistical Models[C]. IEEE International Conference on Images Processing. Rochester, New York, USA, September 22-25, 2002:905-908.
2. LYU S, FARID F. Steganalysis using color wavelet statistics and one class support vector machines[C]. Proc. SPIE Symp. lectronic Imaging. San Jose, CA :SPIE 2004:35-45.
3. LYU S, FARID F.Steganalysis using higher-order image statistics[J]. Trans. Information Forensics and Security, 2006. 1(1): 111- 119.
4. XUAN G R, SHI Y Q, GAO J J et al. Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions[C]. The 7th Information Hiding Workshop (IHW05). Barcelona, Catalonia, Spain, June 6-8,2005.262-277.
5. 黄聪,宣国荣,高建炯,施云庆. 基于图像及其预测误差图小波频域矩的隐写分析[J]. 计算机应用研究, 2006. 26(8):1851-1853
6. 黄聪,高建炯,宣国荣,施云庆.基于小波直方图频域矩的J P E G图像隐写分析[J]. 计算机工程与应用, 2006. 30:95-97.
7. SHI Y Q, XUAN G R, ZOU D K. Image Steganalysis Based on Moment of Characteristic Function Using Wavelet Decomposition, Prediction-Error Image, and Neural Network[C]. IEEE International Conference on Multimedia and Expo (ICME05). Amsterdam, Netherlands,: IEEE, 2005:269-272.
8. LIU Z G, PING L D, CHEN J et al. Steganalysis Based on Differential Statistics[C]. Cryptology and Network Security. CANS06, Suzhou, Dec. 8-10, 2006.224-240.
9. 刘祖根,平玲娣,史烈,孙康.基于主元特征的隐写分析算法[J]. 浙江大学学报(工学版), 2007. 41(12):1991-1996.
10. Wang Y. Detection and information-theoretic analysis of steganography and fingerprinting[D]:[PHD thesis]. Department of Electrical and Computer Engineering in the Granduate College of the University of Illinois at Urbana-Champaign, 2006.
11.GOLJAN M, FRIDRICH J, HOLOTYAK T. New Blind Steganalysis and Its Implication[C]. Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose,CA: SPIE. 2006:1-13.
12. MEHRABI M A, AGHAEINIA H. Abolghasemi M. Image Steganalysis Based on Statistical Moments of Wavelet Subband Histogram of Images with Least Significant Bit planes[C]. 2008 Congress on Image and Signal Processing. Sanya, Hainan, China: IEEE Computer Society Washington, DC, USA. 2008:768-772.
13. MEHRABI M A, FAEZ A, BAYESTEH R. Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in Different Frequencies and Support Vector Machine[C]. Third International Conference on Natural Computation. Haikou, China, Aug. 24- 27, 2007.587-590.
14.WEINBERGER M, SEROUSSI, SAPIRO.LOCO-I:A low complexity context-based lossless image compression algorithm[C]. Proc, of IEEE Data Compression Conf. Snowbird, Utah, Mar. 31–Apr. 3, 1996. 140-149.
15. ROCHA A, GOLDENSTEIN S, SCHERIRER W, BOULT T. The Unseen Challenge Data Sets[C]. IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.Anchorage, Alaska: IEEE Computer Society Washington, DC, USA, 2008.1-8.
16.CHANG C C,LIN C J. SVM:a Library for Support Vector Machines[CP]. URL:
http://www.csie.ntu.edu.tw/~cjlin.2008.12.28.
作者简介:
孙子文(1968-),女,博士生,副教授,研究领域为信息隐藏理论和技术,图像处理。
(责任编辑:adminadmin2008)