共 25 条
- [1] FILLER T, JUDAS J, FRIDRICH J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
- [2] HOLUB V, FRIDRICH J, DENEMARK T., Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, 1, pp. 1-13, (2014)
- [3] GUO L J, NI J Q, SU W K, Et al., Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2669-2680, (2015)
- [4] TANG G M, SUN Y, XU X Y, Et al., Adaptive JPEG steganography based on distortion cost updating, Journal on Communications, 38, 9, pp. 1-8, (2017)
- [5] SU W K, NI J Q, LI X H, Et al., A new distortion function design for JPEG steganography using the generalized uniform embedding strategy, IEEE Transactions on Circuits and Systems for Video Technology, 28, 12, pp. 3545-3549, (2018)
- [6] HU X L, NI J Q, SHI Y Q., Efficient JPEG steganography using domain transformation of embedding entropy, IEEE Signal Processing Letters, 25, 6, pp. 773-777, (2018)
- [7] CHEN K J, ZHOU H, ZHOU W B, Et al., Defining cost functions for adaptive JPEG steganography at the microscale, IEEE Transactions on Information Forensics and Security, 14, 4, pp. 1052-1066, (2019)
- [8] WANG Y F, LI W X, ZHANG W M, Et al., BBC: enhanced block boundary continuity on defining non-additive distortion for JPEG steganography, IEEE Transactions on Circuits and Systems for Video Technology, 31, 5, pp. 2082-2088, (2021)
- [9] WANG Z C, FENG G R, QIAN Z X, Et al., JPEG steganography with content similarity evaluation, IEEE Transactions on Cybernetics, (2022)
- [10] PEVNY T, FRIDRICH J., Merging Markov and DCT features for multi-class JPEG steganalysis, Proceeding of Security, Steganography, and Watermarking of Multimedia Contents IX, pp. 28-40, (2007)