Open Access
This article has a note: [note]

MATEC Web of Conferences
Volume 22, 2015
International Conference on Engineering Technology and Application (ICETA 2015)
Article Number 01012
Number of page(s) 9
Section Information and Communication Technology
Published online 09 July 2015
  1. Sun, Y.F. & Liu, F.L. 2010. A study on the anti-detection property of the spread spectrum steganography of Gauss-Markov carriers, Data Acquisition and Processing, 25(4): 462–468.
  2. Xi, L., Ping, X.J. & Zhang, H. 2012. Security analysis of the self-adaptive spread spectrum steganography based on the GMM model, Computer Engineering, 38(1): 137–139.
  3. Ouyang, C.J., Li, B., Li, X. & Wang, N. 2012. Security measure of the image steganographic system based on the similarity measure of Vague set, Chinese Journal of Computers, 35(7): 1510–1521. [CrossRef]
  4. Xu, C.Y. & Ping, X.J. 2010. An analysis on the video steganography based on the spatial-temporal correlation, Journal of Image and Graphics, 15(9): 1331–1337.
  5. Xu, L., Guo, L., Wang, C.P., Wang, Y.J. & Yang, F. 2010. Direct spread spectrum audio steganalysis based on video features, Communication Technologies, 43(1): 78–81.
  6. Qi, K. & Xie, D.Q. 2013. Steganalysis of colored images based on noise model and channel integration, Computer Research and Progress, 50(2): 307–318.
  7. Zhou, H.Z. & Wang, D.M. 2014. Video steganalysis of fine identified spatial-temporal characteristics, Computer Engineering, 40(1): 149–152.
  8. Zhong, W.D., Wu, J.Q., Wu, G.R. & Yang, H.B. 2012. A video steganalysis method based on the invisibility of spatial-temporal redundancy statistics, Application Re-search Of Computers, 29(10): 3846–3850
  9. Rong, T.Z. 2012. Study on the Prediction Method Based on Higher Order Period Markov Chain Model, a thesis of the Doctor’s degree. Chongqing University.
  10. Pegram G. G. S. 1975. A multinomial model for transition probability matrices, Journal of Applied Probability, 12(3): 498–506. [CrossRef]
  11. Raftery A.E. 1985. A model for high-order Markov chains, Journal of the Royal Statistical Society, 47(3): 528–539.
  12. Cachin C. 2004. An information-theoretic model for steganography, Information and Computation, 192(1): 41–56. [CrossRef]
  13. Wang, S.Z., Zhang, X.P. & Zhang, W.M. 2009. Research progress of the steganalysis with digital images as carriers, Chinese Journal of Computers, 32(7): 1247–1263 [CrossRef]
  14. Luo, X.Y., Wang, D.S. & Wang, P. 2008. A review on blind detection for image steganography, Signal Processing, 88(9): 2138–2157. [CrossRef]
  15. Sullivan K, Madhow U. & Chandrasekaran S, et al. 2006. Steganalysis for Markov cover data with applications to images, IEEE Transaction on Information Forensics and Security, 1(2): 275–287. [CrossRef]
  16. Cox I J, Kilian J, Leighton T, et al. 1997. Secure spread spectrum watermarking for multimedia, IEEE Transaction on Image Processing, 6(12): 1673–1687. [CrossRef]
  17. Marvel L M, Boncelet C G. & Retter C T. 1999. Spread spectrum image steganography, IEEE Transaction on Image Processing, 8(8): 1075–1073. [CrossRef]
  18. Fridrich J. & Goljan M. 2003. Digital image steganography using tochastic modulation, in Proceedings of SPIE: Security, Steganograhy, and Watemarking of Multimedia Contents V, SPIE: Santa Clara, Cuba, 121(2): 191–202.
  19. Zhang, Z. 2010. Research on High-order Statistical Secure Steganography Algorithm, a thesis of the Doctor’s degree. Nanjing: Nanjing University of Science and Technology.
  20. Schaefer G. & Stich M. 2004. UCID-An Uncompressed Colour Image Database.
  21. Zhang, Z., Liu, G.J., Wang, J.W., Dai, Y.W. & Wang, Z.Q. 2010. Spread spectrum steganalysis based on the image high-order MARKOV chain model, Chinese Journal of Electronics, 38(11): 2578–2585