[1]
|
G. Kipper, “Investigator’s Guide to Steganography,” Auerbach Publications, Boca Raton, 2003.
doi:10.1201/9780203504765
|
[2]
|
P. Sallee, “Model-based Steganography,” Springer Verlang, Berlin, 2004.
|
[3]
|
A. Spanias, T. Painter and V. Atti, “Audio Signal Process And Coding,” John Wiley and Sons, Hoboken, 2007.
doi:10.1002/0470041978
|
[4]
|
U. Zolzer, “Digital Audio Signal Processing,” John Wiley and Sons, Hoboken, 2008. doi:10.1002/9780470680018
|
[5]
|
J. S. Jacaba, “Audio Compression Using Modified Discrete Cosine Transform: The MP3 Coding Standard,” University of the Philippines, Manila, 2001.
|
[6]
|
L. Rossi, F. Garzia and R. Cusani, “Peak-Shaped-Based Steganographic Technique for JPEG Images,” EURASIP Journal on Information Security, 2009, Article ID: 382310-382317. doi:10.1155/2009/382310
|
[7]
|
R. Yu, X. Lin, S. Rahardja and C. C. Ko, “A Statistic Study of the MDCT Coefficient Distribution for Audio,” IEEE International Conference on Multimedia and Expo, Taipei, 30-30 June 2004, pp. 1483-1486.
|
[8]
|
D. Liu, H. Zhang, M. Polycaropou, C. Alippi and H. He, “Advances in Neural Networks,” Springer Verlag, Berlin, 2011.
|
[9]
|
R. Bohme, “Advanced Statistical Steganalysis,” Springer, Berlin, 2010.
|
[10]
|
K. B. Shiva Kumar, K. B. Raja and R. K. Chhotaray, “Sabyasachi Pattanaik, Bit Length Replacement Steganography Based on DCT Coefficients,” International Journal of Engineering Science and Technology, Vol. 2, No. 8, 2010, pp. 3561-3570.
|
[11]
|
A. Westfeld, “F5-A Steganographic Algorithm,” Springer Verlang, Berlin, 2001.
|
[12]
|
K. Lee, A. Westfeld and S. Lee, “Category Attack for LSB Steganalysis of JPEG Images,” Springer Verlang, Berlin, 2006.
|
[13]
|
T. Zhang and X. Ping, “A Fast and Effective Steganalytic Technique against Jsteg-Like Algorithms,” Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), Melbourne, 9-12 March 2003, pp. 307-311.
|