1. Fridrich J, Soukal D. Matrix embedding for large payloads. IEEE Transactions on Information Security and Forensics, 2006, 1(3): 390-394
2. Westfeld A. High capacity despite better steganalysis (F5-A steganographic algorithm). Proceedings of the 4th International Workshop on Information Hiding (IHW’01), Apr 25-27, 2001, Pittsburgh, PA, USA. LNCS 2137. Berlin, Germany: Springer-Verlag, 2001: 289-302
3. Fridrich J, Goljan M, Lisonek P, et al. Writing on wet paper. IEEE Transcriptions on Signal Processing, 2005, 53(10-2): 3923-3935
4. Zhang X P, Wang S Z. Dynamical running coding in digital steganography. IEEE Signal Processing Letters, 2006, 13(3): 165-168
5. Ker A D. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 2005, 12 (6): 441-444
6. Wang H Q, Wang S Z. Cyber warfare: steganography vs steganalysis. Communication of the ACM, 2004, 47(10): 76-82 |