1 |
http://en.wikipedia.org/wiki/Steganography.
|
2 |
A. Cheddad, J. Condenll, K. Curran, P. M. Kevitt, "Digital image steganography: Survey and analysis of current methods," Signal Processing, vol. 90, pp. 727-752, 2010.
DOI
ScienceOn
|
3 |
K. S. Vijay, S. Vishal, "A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection," Journal of Theoretical and Applied Information technology, vol. 36, no. 1, 2012.
|
4 |
X. Luo, F. Liu, S. Lian, C. Yang, S. Gritzalis, "On the typical statistic features for image blind steganalysis," IEEE Journal on Selected Areas in Communications, vol. 29, pp. 1404-1422, 2011.
DOI
ScienceOn
|
5 |
J. Fridrich, J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 868-882, 2012.
DOI
ScienceOn
|
6 |
G. R. Xuan, Y. Q. Shi, J. J. Gao, D. K. Zou, C. Y. Yang, Z .P. Zhang, P. Q. Chai, C. H. Chen and W. Chen, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions," Proceedings of Information Hiding Workshop, Lecture Notes in Computer Science, vol. 3727, pp. 262-277, 2005.
|
7 |
C. Liu, C. Ouyang, M. Guo and H. Chen, Harmsen and W. Pearlman. "Image steganalysis based on spatial domain and DWT domain features," Proceedings of Second International Conference on Network Security, Wireless Communications and Trusted Computing, pp. 329-331, 2010.
|
8 |
T. Pevny, P. Bas and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE transaction on Information Forensics and Security. vol. 5, pp. 215-224, 2010.
DOI
ScienceOn
|
9 |
박태희, 현승화, 김재호, 엄일규, "웨이블릿 부밴드의 조인트 모멘트를 이용한 스테그분석," 전자공학회논문지, vol. 48-SP, pp. 71-78, 2011.
|
10 |
Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography," Information Sciences, vol. 178, pp. 21-36, 2008.
DOI
ScienceOn
|
11 |
Y. Wang, P. Moulin, "Optimized feature extraction for learning-based image steganalysis," IEEE Trans. On Image Processing, vol. 2, no. 1, pp. 31-45, 2007.
|
12 |
T. Zhang, X. Ping, "A new approach to reliable detection of LSB steganography in natural images," Signal Processing, vol. 83, no. 10, pp. 2085-2093, 2003.
DOI
ScienceOn
|
13 |
박태희, 김재호, 엄일규, "스테고 잡음 확대를 위한 영상분해와 동시 발생확률에 기반한 스테그분석," 전자공학회논문지, vol. 49-SP, no.2, pp. 94-101, 2012.
|
14 |
박태희, 엄일규, "곱셈잡음 첨가를 이용한 스테그분석의 성능개선," 전자공학회논문지, vol. 49-CI, no. 4, pp .23-30, 2012.
|
15 |
CorelDraw Software, www.CorelDraw.com.
|
16 |
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. On Image Processing, Vol. 6, pp. 1673-1687, 1997.
DOI
ScienceOn
|
17 |
I. H. WITTEN, E. Frank, Data Mining, Elservier ,2005.
|