[1]Provos N, Honeyman P. Hide and seek: An introduction to steganography[J]. IEEE Security & Privacy, 2003, 1(3): 3244[2]Johnson N F, Jajodia S. Exploring steganography: Seeing the unseen[J]. IEEE Computer, 1998, 31(2): 2634[3]郭艳卿. 隐密对抗的理论及方法研究[D]. 大连: 大连理工大学, 2009[4]Holub V, Fridrich J. Lowcomplexity features for JPEG steganalysis using undecimated DCT[J].IEEE Trans on Information Forensics and Security, 2015, 10( 2): 219228[5]Kodovsky J A N. Steganalysis of digital images using rich image representations and ensemble classifiers[D].New York: State University of New York, 2012[6]Pevny T, Fridrich J. Merging markov and DCT features for multiclass JPEG steganalysis[G]SPIE 6505: Proc of SPIE, Security, Steganography, and Watermarking of Multimedia Contents Conf. San Francisco, CA: SPIE Press, 2007:03_103_13[7]Ker D A, Bas P R, Bhme R. Moving steganography and steganalysis from the laboratory into the real world[C] Proc of ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013: 4558[8]Barni M, Cancelli G, Esposito A. Forensics aided steganalysis of heterogeneous images[C] Proc of IEEE Conf on Acoustics Speech and Signal Processing. Piscataway, NJ: IEEE, 2010: 16901693[9]Ker A D, Pevny T. The steganographer is the outlier: Realistic largescale steganalysis[J]. IEEE Trans on Information Forensics and Security, 2014, 9(9): 14241435[10]黄炜, 赵险峰, 盛任农. 基于KFD指标聚类的高隐蔽性JPEG隐写分析[J]. 计算机学报, 2012, 35(9): 19511958[11]Kodovsky J, Sedighi V, Fridrich J. Study of cover source mismatch in steganalysis and ways to mitigate its impact[G] SPIE 9208: Media Watermarking,Security, and Forensics. San Francisco, CA: SPIE Press, 2014: 0M010M12[12]Lubenko I, Ker A D. Steganalysis with mismatched covers: Do simple classifiers help[C] Proc of the 13th ACM Workshop on Multimedia and Security. New York: ACM, 2012: 1118[13]Li Xiaofeng, Kong Xiangwei, Wang Bo, et al. Generalized transfer component analysis for mismatched jpeg steganalysis[C] Proc of IEEE Int Conf on Image Processing (ICIP2013). Piscataway, NJ: IEEE, 2013: 1518[14]Zeng Likai, Kong Xiangwei, Li Ming, et al. JPEG quantization table mismatched steganalysis via discriminative feature transformation[C] Proc of IS&TSPIE Electronic Imaging. San Francisco, CA: SPIE Press, 2015[15]Zhang D, Yang M, Feng X. Sparse representation or collaborative representation: Which helps face recognition[C] Proc of IEEE Int Conf Computer Vision (ICCV). Piscataway, NJ: IEEE, 2011: 471478[16]Guo J, Guo Y, Li L, et al. A universal JPEG image steganalysis method based on collaborative representation[C] Proc of IEEE Int Conf Security Pattern Analysis Cybern (SPAC). Piscataway, NJ: IEEE, 2014: 285289[17]Wright J, Ma Y, Mairal J, et al. Sparse representation for computer vision and pattern recognition[J]. Proc of IEEE, 2010, 98(6): 10311044[18]Gu S, Zhang L, Zuo W, et al. Projective dictionary pair learning for pattern classification[C] Advances in Neural Information Processing Systems. Cambridge: MIT Press, 2014: 793801[19]Zhou N, Shen Y, Peng J, et al. Learning interrelated visual dictionary for object recognition[C] Proc of IEEE Conf on Computer Vision Pattern Recognition (CVPR). Piscataway, NJ: IEEE, 2012: 34903497[20]Kong S, Wang D. A dictionary learning approach for classification: Separating the particularity and the commonality[C] Proc of European Conf on Computer Vision (ECCV). Berlin: Springer, 2012: 186199[21]Gao S, Tsang I W, Ma Y. Learning categoryspecific dictionary and shared dictionary for finegrained image categorization[J]. IEEE Trans on Image Process, 2014: 23(2): 623634[22]Bas P, Filler T, Pevny T. Break our steganographic system: The ins and outs of organizing BOSS[C] Proc of IEEE Int Conf Information Hiding (IH). Piscataway, NJ: IEEE, 2011: 5970
|