1. Fabien A P P, Ross J A, Markus G K. Information hiding-a survey. Proceedings of the IEEE, 1999, 87(7): 1062-1078
2. Eggers J J, Bauml R, Tzschoppe R, et al. Scalar Costa scheme for information embedding. IEEE Transactions on Signal Processing, 2003, 51(4): 1003-1019
3. Dai Yuan-jun, Zhang Li-he, Yang Yi-xian. Digital watermarking applied to MEPG-2 coded video sequences exploiting motion vector. The Journal of China Universities of Posts and Telecommunication, 2004, 11(2): 35-39
4. Özer H, Avc?ba? ?, Sankur B, et al. Steganalysis of Audio Based on Audio Quality Metrics. Proceedings of SPIE, Jun 20-24, 2003, Santa Clara, CA, USA. 2003: 55-66
5. Avc?ba?, ?, Memon N, Sankur B. Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 2003, 12(2): 221-229
6. Gojan J, Goljanm M, Du R. Reliable detection of LSB steganography in color and grayscale images. Proc of the ACM Workshop on Multimedia and Security, Oct 5, Ottawa, Canada. New York, NY, USA: ACM, 2001: 27-30
7. Westfeld P A. Attacks on steganographic systems. Proceedings of Third Internation Workshop on Information Hiding, Sep 29-Oct 1, 1999, Dresden, Germany. Berlin, Germany: Springer- Verlag, 1999: 61-66
9. Duda R O, Hart P E, Stork D G. Pattern Classification. Second Edition, New York, NY, USA: John Wiley & Sons, 2000
10. Vapnik V. The Nature of Statistical Learning Theory. Berlin, Germany: Springer-Verlag, 1995 |