Citation: | WEN Juan, ZHANG Jie, ZHOU Jie, et al., “An Adaptive JPEG Steganographic Scheme Based on Run-Length Statistical Complexity,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 52-59, 2018, doi: 10.1049/cje.2017.11.012 |
T. Rabie and I. Kamel, "On the embedding limits of the discrete cosine transform", Multimedia Tools and Applications, Vol.75, No.10, pp.5939-5957, 2016.
|
A. Cheddad, J. Condell, K. Curran, et al., "Digital image steganography:Survey and analysis of current methods", Signal Process, Vol.90, No.3, pp.727-752, 2010.
|
A. Yasin, N. Shehab, M. Sabha, et al., "An enhanced steganographic model based on DWT combined with encryption and error correction techniques", International Journal of Advanced Computer Science and Applications, Vol.6, No.12, pp.49-55, 2015.
|
J. Fridrich, M. Goljan and D. Hogea, "Steganalysis of JPEG images:Breaking the F5 algorithm", Proc. of Information Hiding:5th International Workshop, The Netherlands, LNCS, Springer, pp.310-323, 2002.
|
J. Fridrich, T. Pevny and J. Kodovsky, "Statistically undetectable JPEG steganography:Dead ends, challenges, and opportunities", Proc. of the 9th ACM Multimedia and Security Workshop, Dallas, TX, USA, pp.3-14, 2007.
|
X.Y. Shi, S.L. Ma, Y.J. Hu, et al., "A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures", Acta Electronica Sinica, Vol.43, No.6, pp.1094-1100, 2015. (in Chinese)
|
T. Filler, J. Judas and J. Fridrich, " Minimizing embedding impact in steganography using trellis-codedquantization", Proc. of SPIE, Media Forensics and Security Ⅱ, San Francisco, USA, pp.175-178, 2010.
|
T. Filler and J. Fridrich, "Design of adaptive steganographic schemes for digital images", Proc. of SPIE, Electronic Imaging, Media Watermarking, Security and Forensics Ⅲ, San Francisco, USA, pp.1-14, 2011.
|
T. Pevny, T. Filler and J. Fridrich, "Using high-dimensional image models to perform highly undetectable steganography", Proc. of Information Hiding 12th International Workshop, Heidelberg, Germany, pp.161-177, 2010.
|
G. Liu, W. Liu, Y. Dai, et al., "Adaptive steganography based on syndrome-trellis codes and local complexity", Proc. of IEEE International Conference on Multimedia Information Networkingand Security,Beijing, China, pp.323-327, 2013.
|
F. Li, X. Zhang, J. Yu, et al., "Adaptive jpeg steganography with new distortion function", Annals of Telecommunications, Vol.69, No.7, pp.431-440, 2014.
|
C. Wang and J. Ni, "An adaptive JPEG steganographic scheme based on the block entropy of DCT coefficients", International Journal of Digital Crime and Forensics, Vol.4, No.2, pp.13-27, 2012.
|
E. Kawaguchi, R.O. Eason, "Principle and applications of BPCS steganographys", Proc. of SPIE:Multimedia Systems and Applicationsy, Bostor, USA, pp.464-473, 1999.
|
Y.B. Guo,X.G. You, C.T. Zhang, et al., "Study of image bit-plane complexity in information hiding", Acta Electronica Sinica, Vol.34, No.6, pp.1048-1052, 2006. (in Chinese)
|
T. Filler, T. Pevny and P.Bas, "BOSS (Break Our Steganography System)", http://www.agents.cz/boss, 2010-9-9.
|
J. Kodovsky and J. Fridrich, "Calibration revisited", Proc. of the 11th ACM Multimedia and Security Workshop, Princeton, USA, pp.63-74, 2009.
|
V. Holub and J. Fridrich, "Low-complexity features for JPEG steganalysis using undecimated DCT", IEEE Transactions on Information Forensics and Security, Vol.10, No.2, pp.219-228, 2015.
|
J. Kodovsky, J. Fridrich and V. Holub, "Ensemble classifiers for steganalysis of digital media", IEEE Transactions on Information Forensics and Security, Vol.7, No.2, pp.432-444, 2012.
|