References
- T. Aura, "Practical invisibility in digital communication", Journal on Selected Areas in Communications, Vol. 16, No.4, pp. 474-481, 1988. https://doi.org/10.1109/49.668971
- G. Berg, I. Davidson, M. Y. Duan and G. Paul, "Searching For Hidden Messages: Automatic Detection of Steganography", Conference : Innovative Applications of Artificial Intelligence, 2003.
- Xuan-Hien Dang and K. C. S. Kota, "Case Study : An Implementation of a Secure. Steganographic System", Security and Management '06 : LasVegas, Nevada, USA, pp. 84-90, 2006.
- I. Davidson and G. Paul, "Locating Secret Messages in Images", KDD'04, Seattle, Washington, USA, 2004.
- I. Davidson, G. Paul and S. S. Ravi, "Steganography Using Spatially Interesting Pixels", [Online] Available http://www.cs.albany.edu/-avidson/, 2004.
- S. D. Dickman, "An Overview of Steganography", [Online] Available www.infosec.imu.edu/reoorts/jmu-infosec-tr-2007-002.pdf, 2007.
- Roshidi Din and Azman Samsudin, "Digital Steganalysis Computational Intelligence Approach", Internation Journal of Computers, Issue 1, Vol. 3, pp. 161-170, 2009.
- Y. K Lee and L. H. Chen, "High capacity image steganographic model", In IEE Proceedings Vision, Image and Signal Processing, 2000.
- H. Farid, "Detecting Steganographic Messages in Digital Images", Technical Report TR2001-412, Dartmouth College, 2001.
- D. Fu, Y. Q. Shi, D. Zou and G. Xuan, "JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain", IEEE MMSP 2006, Canada, 2006.
- S. S. Ji, "Detecting Steganographic Contents Using EWM Statistics", KSIIS, Vol. 13, No.3, pp. 54-62, 2008.
- N. Provos, "Defending Against Statistical Steganalysis", 10th USENIX Security Symposium, Washington, DC. pp. 323-335, 2001.
- K. Sullivan, U. Madhow, S. Chandrasekaran and B. S. Manjunath, "Steganalysis for Markov Cover Data With Applications to Images", IEEE Transactions on Information Forensics and Security, Vol. 1, No.2, 2006.