[1]G. J. Simmons, “‘Prisoners’ problem and the subliminal channel,” CRYPTO83—Advances in Cryptology, pp. 51–67, 1984.
[2]N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques,” Proc. Information Hiding, pp. 43–78, 2000.
[3]J. Fridrich, M. Goljan, P. Lisonˇek, and D. Soukal,“Writing on wet paper,” IEEE Trans. on Signal Processing, vol. 53, no. 10, October 2005.
[4]Y.-T. Wu and F.-Y. Shih,“Genetic algorithm based methodology for breaking the steganalytic systems,” IEEE Trans. on Systems, Man, and Cybernetics—Part B: Cybernetics, vol. 36, no. 1, February 2006.
[5]X. Zhang and S. Wang, “Dynamical running coding in digital steganography,” IEEE Signal Processing Letters, vol. 13, no. 3, March 2006.
[6]A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools and some lessons learned,” Proc. 3rd Int. Workshop on Information Hiding, pp. 61–76, Sep. 1999,
[7]J. Fridrich, M. Goljan, and D. Hogea, “New methodology for breaking steganographic techniques for JPEGs,” Proc. EI SPIE, pp. 143–155, Jan. 2003.
[8]H. Farid, “Detecting steganographic message in digital images,” Dept. Comput. Sci., Dartmouth College, Hanover, NH, Tech. Rep. TR2001-412, 2001.
[9]I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics,” IEEE Trans. Image Process., vol. 12, no. 2, pp. 221–229, Feb. 2003.
[10]W.-N. Lie and G.-S. Lin, “A feature-based classification technique for blind image steganalysis,” IEEE Trans. on Multimedia , vol.7, no.6, pp.1007-1020, Dec. 2005
[11]S. Liu, H. Yao, W. Gao, “Steganalysis of Data Hiding Techniques in Wavelet Domain,” IEEE Proc. of the Int’l Conf. on Information Technology: Coding and Computing , vol. 1, pp. 751-754, 2004.
[12]K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran, ”Statistical restoration for robust and secure steganography,” IEEE International Conference on Image Processing,vol. 2,pp.11-14, 2005.
[13]S. Dumitrescu and X. Wu, “A new framework of LSB steganalysis of digital media,” IEEE Trans. on Signal Processing, vol. 53, no. 10, Oct. 2005.
[14]O. Dabeer, K. Sullivan, U. Madhow,S. Chandrasekaran, and B. S. Manjunath,”Detection of hiding in the least significant bit,” IEEE Trans. on Signal Processing, vol. 52, no. 10, Oct. 2004.
[15]A. D. Ker,” Steganalysis of LSB matching in grayscale images,” IEEE Signal Processing letters, vol. 12, no. 6, June 2005.
[16]G. Gul, A. E. Dirik, I. Avcibay,”Steganalysis of Perturbed Quantization,” IEEE Signal Processing and Communications Applications, April 2006.
[17]林國祥,多媒體數位浮水印、資料隱藏和隱藏追蹤技術之研究,國立中正大學電機所博士論文,2005年五月。[18]D. LEVICKÝ and P. FORIŠ, “Human visual system models in digital image watermarking,” RADIOENGINEERING, vol. 13, no. 4, December 2004.
[19]Q. Pei ,”Impact analysis of digital watermarking on perceptual quality using HVS models,”
[20]C.-Y. Lin and S.-F. Chang, “Watermarking capacity of digital images based on domain-specific masking effects,” Proc. Int’l Conf. on Information Technology: Coding and Computing, pp. 90-94, 2001.
[21]J. R. Hernández,, M. Amado, and F. Pérez-González, ”DCT-domain watermarking techniques for still images:detector performance analysis and a new structure,” IEEE Trans. on Image Processing, vol. 9, no. 1, January 2000.
[22]W.-N. Lie and L.-C.n Chang, “Data hiding in images with adaptive numbers of least significant bits based on the human visual system,” IEEE Proc. Int’l Conf. on image processing, vol. 1, pp. 286-290, 1999.
[23]張容瑄、紀美秀,模擬退火法在校車路線問題上的應用,國立中正大學數學所碩士論文,2001年6月。[24]Y. Seki, H. Kobayashi, M. Fujiyoshi and H. Kiya, “Quantization-based image steganography without data hiding position memorization,” IEEE Int’l Symposium on Circuits and Systems, vol. 5, pp.4987-4990, May 2005.
[25]W.-N. Lie, G.-S. Lin, and S.-L. Cheng, “Dual Protection of JPEG Images Based on Informed Embedding and Two-stage Watermark Extraction Techniques,” Accepted for publication in IEEE Trans. on Information Forensics and Security (IFS), April. 2006.
[26]N. Damera-Venkata, T.-D. Kite, W.-S. Geisler, B.-L. Evans, and A.- C. Bovik, ”Image quality assessment based on a degradation model,” IEEE Trans. on Image Processing, vol. 9, no. 4, April 2000
[27]S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004