|
[1]A. Latham (1999) JPHIDE and JPSEEK [Online]. Available: http://linux01.gwdg.de/~alatham/stego.html [2]A. Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61-76. [3]A. Westfeld, “F5—A Steganographic Algorithm: High Capacity Despite Better Steganalysis,” Proc. 4th Int’l Workshop Information Hiding, Springer-Verlag, 2001, pp. 289-302. [4]A. Westfeld (2001) F5 [Online]. Available: http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html [5]C. C. Chang, T. S. Chen, L. Z. Chung, “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1, 2002, pp. 123-138. [6]C. C. Chang and H. W. Tseng, “Steganography using JPEG-compressed images,” Proc. of IEEEComputer and Information Technology, Vol. 14, No. 16, Sept. 2004, pp. 12-17. [7]C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Trans. On Image Processing, Vol. 8, No. 1, Jan 1999, pp. 58-68. [8]D. Upham (1997) JPEG-JSteg [Online]. Available: http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz [9]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proc. of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078. [10]G. W. Wallace, “The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Electronics, Vol. 38, no. 1, 1992, pp. xviii-xxxiv. [11]H. Farid, “Detecting Hidden Messages Using Higher-Order Statistical Models,” Proc. Int’l Conf. Image Processing, IEEE Press, 2002. [12]I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12, Dec 1997, pp. 1673-1687. [13]ISO/IEC JTC1 10918-1, Information Technology – Digital Compression and Coding of Continuous – Tone Still Image: Requirements and Guidenlined, ITU-T Rec. T.81, 1994. [14]ISO/IEC 15544-1, Information Technology – JPEG2000 Image Coding System – Part1: Core Coding System, 2000. [15]J. Fridrich, M. Goljan, and D. Hogea, “Attacking the OutGuess,” Proc. ACM Workshop Multimedia and Security 2002, ACM Press, 2002. [16]J. Fridrich, M. Goljan, and D. Hogea, “New Methodology for Breaking Steganographic Techniques for JPEGs,” Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 143-155. [17]J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm,” Proc. 5th Int’l Workshop Information Hiding, Springer-Verlag, 2002. [18]M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proc. IEEE, Vol. 86, No. 6, 1998, pp. 1064-1087. [19]N. F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganographic Software,” Proc. 2nd Int’l Workshop in Information Hiding, Springer-Verlag, 1998, pp. 273-289. [20]N. Provos, “Defending Against Statistical Steganalysis,” Proc. 10th Usenix Security Symp., Usenix Assoc., 2001, pp. 323-335. [21]N. Provos (2001) Outguess [Online]. Available: http://www.outguess.org/outguess-0.2.tar.gz [22]N. Provos and P. Honeyman, “Hide and seek: an introduction to steganography,” IEEE Trans. Security & Privacy Magazine, vol. 1, no. 3, 2003, pp. 32-44. [23]R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/~westfeld/crandall.pdf [24]S. Lyu and H. Farid, “Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines,” Proc. 5th Int’l Workshop on Information Hiding, SpringerVerlag, 2002. [25]T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms,” Proc. 8th ACM Symp. Applied Computing, ACM Press, 2003. [26]W. Bender, D. Gruhl, and N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3&4, 1996, pp. 313-336. [27]Y. Noguchi, H. Kobayashi, H. Kiya, “A Method of Extracting Embedded Binary Data from JPEG Bitstreams Using Standard JPEG Decoder,” Proc. of IEEE International Conference on Image Processing, Vancouver, BC, Canada, Vol. 1, Sept 2000, pp. 577-580. [28]Y. Y. Chen, H. K. Pan, and Y. C. Tseng, “A Secure Data Hiding Scheme for Binary Images,” IEEE Trans. on Communications, Vol. 50, No. 8, Aug 2002, pp. 1227-1231. [29]張真誠、黃國峰、陳同孝,電子影像技術,旗標電腦圖書,民國九十二年。 [30]陳同孝、張真誠、黃國峰,數位影像處理技術,旗標電腦圖書,民國九十二年,ISBN 957-22-3553-2。 [31]賴溪松、韓亮、張真誠,近代密碼學及其應用,松崗電腦資料股份有限公司,民國八十九年。
|