1 |
D. Upham, 'Jsteg'. http://www. seeurityfocus.com/tools/1434, 1997
|
2 |
A. Westfeld and A. Pfitzmann, 'Attacks on Steganographic Systems', Information Hiding-Third International Workshop, IH'99, Lecture Notes in Computer Science 1768, pp. 61-76, 1999
|
3 |
http://www.cs.washington.edu/research/imagedatabase/groundtruth/
|
4 |
A. Westfeld and A. Pfitzmann, 'High Capacity Despite Better Steganalysis F5-A Steganographic Algorithm', Information Hiding-4th International Workshop Lecture Notes in Computer Science 2137, pp. 289-302, 200l
|
5 |
N. Provos, 'OutGuess - Universal Steganography', http://www.outguess.org / ,August 1998
|
6 |
T. Zhang and X. Ping, 'A Fast and Effective Steganalytic Technique against JSteg-like Algorithms ', In Proceedings of ACM Symposium on Applied Computing, ACM Press, pp. 307-331. 2003
|
7 |
A. Latham, 'JP Hide & Seek', http:// linux01.gwdg.de/alatham /stego.html. 1997
|
8 |
J. Fridrich and M. GoUan and D. Hogea, 'Attacking the Out Guess', Proc. of the ACM Workshop on Multimedia and Security, 2002
|
9 |
N. Provos, 'Defending Aganist Statistical Steganalysis', Proceedings of the 10th USENIX Security symposium, pp. 323-335, 2001
|