[1]Bender, W., Gruhl, D., Morimoto, N., and Lu, A., “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, No. 3-4, pp. 313-336, 1996.
[2]Zhang, X. and Wang, S., “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recognition Letters, Vol. 25, No. 3, pp. 331-339, 2004.
[3]http://www.usatoday.com/life/cyber/tech/2001/10/17/bin-laden-site.htm (2013.3.15)
[4]Shih, F. Y. and Wu, Scott. Y. T., “Combinational Image Water Marking in The Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, 2003.
[5]Chang, C. C., Chen, T. S., and Chung, L. Z., “A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Sciences, Vol. 141, No. 1-2, pp. 123-138, 2002.
[6]Joo, S., Suh, Y., Shin, J., and Kikuchi, H., “A New Robust Watermark Embedding into Wavelet DC Components,” ETRI Journal, Vol. 24, No. 5, pp. 401-404, 2002.
[7]Lee, W. B. and Chen, T. H., “A Public Verifiable Copy Protection Technique for Still Images,” Journal of Systems and Software, Vol. 62, No. 3, pp. 195-204, 2002.
[8]Alturki, F. and Mersereau, R., “Secure Blind Image Steganographic Technique Using Discrete Fourier Transformation,” Proceedings of IEEE International Conference on Image Processing, Thessaloniki, Greece, pp. 542-545, 2001.
[9]Fridrich, J., Goljan, M., and Rui, D., “Detecting LSB Steganography in Color, and Gray-scale Images,” Magazine of IEEE Multimedia Special Issue on Security, Vol. 4, No. 4, pp. 22-28, 2001.
[10]Westfeld, A. and Pfitzmann, A., “Attacks on Steganographic Systems,” Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, pp. 61-75, 1999.
[11]Mielikeainen, J., “LSB Matching Revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, pp. 285-287, 2006.
[12]Wu, D. C. and Tsai, W. H., “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.
[13]Joo, J. C., Lee, H. Y., Bui, C. N., Yoo, W. Y., and Lee, H. K., “Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function,” Proceedings of the 9th Pacific Rim Conference on Multimedia:Advances in Multimedia Information Processing, Tainan, Taiwan, pp. 476-485, 2008.
[14]Joo, J. C., Kim, K.S., and Lee, H. Y., “Steganalysis Defeating the Steganography Using Pixel-Value Differencing and Modulus Function,” Optical Engineering, Vol. 49, No. 7, pp. 1-11, 2010.
[15]Sabeti, V., Samavi, S., Mahdavi, M., and Shirani, S., “Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks,” Pattern Recognition, Vol. 43, No. 1, pp. 405-415, 2010.
[16]劉江龍、劉興漢、李翊豪,“可偵測使用模數運算像素值差異藏密法之偵密技術”,第20屆國防科技學術研討會,桃園,台灣,第631-637頁,2011年11月18日。
[17]Zaker, N. and Hamzeh, A., “A Novel Steganalysis for TPVD Steganographic Method Based on Differences of Pixel Difference Histogram,” Multimedia Tools and Applications , Vol.58,No.1,pp.147-166,2012.
[18]劉江龍、劉興漢、李翊豪,“適用於三向型像素值差異藏密法之偵密技術”,第二屆航空技術學術研討會,高雄,台灣,第221-228頁,2012年9月21日。
[19]Andreas Westfeld., and AndreasPfitzmann., “Attacks on Steganographic Systems” Proceedings of the Third International Workshop on Information Hiding , pp. 61-76, 1999. ISBN: 3-540-67182-X.
[20]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information hiding - a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062-1078, July 1999.
[21]林志麟,“植基於影像統計特徵分析之資訊隱藏偵測技術研究”,博士論文,國防大學理工學院國防科學研究所,桃園,台灣,2008年7月31日。[22]Fridrich, J., Goljan, M., and Soukal, D., “Higher-order statistical steganalysis of palette images,” Proceedings of SPIE: Electronic Imaging, Santa Clara, CA, pp. 178-190, Jan. 2003.
[23]Fridrich, J., and Pevny, T., “Multiclass Blind Steganalysis for JPEG Images,” Proceedings of SPIE Electronic Imaging, Photonics West, Jan. 2006.
[24]Farid, H. “Detecting Hidden Messages Using Higher-order Statistical Models,” Proceedings of 2002 International Conference on Image Processing, Rochester, NY, pp. 905-908, Sept. 2002.
[25]Goljan, M., Fridrich, J., and Holotyak, T. S., “New Blind Steganalysis and Its Implications,” Proceedings of SPIE Electronic Imaging, Photonics West, Jan. 2006.
[26]Lie, W.-N., and Lin, G.-S., “A Feature-based Classification Technique for Blind Image Steganalysis,” IEEE Transactions on Multimedia, vol. 7, no. 6, pp. 1007-1020, Dec. 2006.
[27]Provos, N., and Honeyman, P., “Detecting Steganographic Content on the Internet,” Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002
[28]https://zh.wikipedia.org/wiki/ROC (2018.5.20)
[29]https://www.mathworks.com/products/matlab.html(2019.3.28)
[30]https://www.agents.cz/boss/BOSSFinal/index.php?mode=VIEW&tmpl=materials (2018.5.20)