[1]
|
Kelley, J. (2001) Terror Groups Hide behind Web Encryption. USA Today.
http://www.usatoday.com/tech/news/2001-02-05-binladen.htm
|
[2]
|
Victor, O., Waziri, A., Abraham, O., Shafi, I. and Muhammad, A. (2012) Steganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embedment: A Wavelet Approach. International Journal of Computer and Information Technology, 1, 194-202.
|
[3]
|
(2006) Wikipedia. http://www.wikipedia.com/
|
[4]
|
Bateman, P. (2008) Image Steganography and Steganalysis. Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, 6.
|
[5]
|
Tzschoppe, R. and Bauml, R. (2003) Steganographic System Based on Higher-Order Statistics. SPIE, 2003.
|
[6]
|
Avcibas, I., Memon, N. and Sankur, B. (2001) Steganalysis Using Image Quality Metrics. Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, 4314, 523-531.
|
[7]
|
Avcibas, I., Sankur, B. and Memon, N. (2002) Image Steganalysis with Binary Similarity Measures. Proceedings of International Conference on Image Processing, 3, 645-648. http://dx.doi.org/10.1109/ICIP.2002.1039053
|
[8]
|
Fridrich, J. (2004) Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. Lecture Notes in Computer Science, 3200, 67-81. http://dx.doi.org/10.1007/978-3-540-30114-1_6
|
[9]
|
Lie, W.N. and, Lin, G.S. (2005) A Feature-Based Classification Technique for Blind Image Stegananlysis. IEEE Transactions Multimeda, 7, 1007-1083. http://dx.doi.org/10.1109/TMM.2005.858377
|
[10]
|
Lyu, S.W. and Farid, H. (2006) Steganalysis Using Higher-Order Image Statistics. IEEE Transactions on Information Forensics and Security, 1, 111-119. http://dx.doi.org/10.1109/TIFS.2005.863485
|
[11]
|
Tzschoppe, R., Auml, R.B., Huber, J.B. and Kaup, A. (2003) Steganographic System Based on Higher-Order Statistics. Proceedings of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, 156-166. http://dx.doi.org/10.1117/12.477301
|
[12]
|
Johnson, N.F. and Jajodia, S. (1998) Exploring Steganography: Seeing the Unseen. Computer, 31, 26-34.
http://dx.doi.org/10.1109/MC.1998.4655281
|
[13]
|
Fridrich, J., Goljan, M. and Du, R. (2001) Reliable Detection of LSB Steganography in Color and Grayscale Images. Proceedings of 2001 ACM Workshop on Multimedia and Security: New Challenges, 27-30.
http://dx.doi.org/10.1145/1232454.1232466
|
[14]
|
Farid, H. (2001) Detecting Steganographic Message in Digital Images. Technical Report, TR2001-412, Dartmouth College, New Hampshire.
|
[15]
|
Xuan, G.R., Sh,i Y.Q. and Gao, J.J. (2005) Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. Proceedings of 7th International Information Hiding Workshop, LNCS, 3727, 262-277. http://dx.doi.org/10.1007/11558859_20
|
[16]
|
Lyu, S.W. and Farid, H. (2006) Steganalysis Using Higher-Order Image Statistics. IEEE Transactions on Information Forensics and Security, 1, 111-119. http://dx.doi.org/10.1109/TIFS.2005.863485
|
[17]
|
Luo, W., Huang, F. and Huang, J. (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5, 201-214. http://dx.doi.org/10.1109/TIFS.2010.2041812
|
[18]
|
Sajedi, H. and Jamzad, M. (2008) A Steganalysis Method Based on Contourlet Transform Coefficients. International Conference of Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP’08), Harbin, 15-17 August, 245-248. http://dx.doi.org/10.1109/IIH-MSP.2008.11
|
[19]
|
Sajedi, H. and Jamzad, M. (2009) ContSteg: Contourlet-Based Steganography Method. Wireless Sensor Network, 1, 163-170.
|
[20]
|
Provos, N. and Honeyman, P. (2002) Detecting Steganographic Contenton the Internet. Internet Society: Network and Distributed System Security Symposium (ISOC NDSS’ February 2002), San Diego
http://www.citi.umich.edu/u/provos/papers/detecting.pdf
|