[1] Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey[J]. Proceedings of the IEEE, 1999, 87(7): 1062-1078.
[2] Ker A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
[3] Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images[J]. IEEE Multimedia, 2001, 8(4): 22-28.
[4] Liu Xueqian, Ping Xijian, Zhang Tao, et al. Steganalysis of LSB matching based on wavelet feature of filtering restoration[J]. Journal of Data Acquisition & Processing, 2010, 25(4): 505-511.
[5] Xu M, Li T, Ping X. Steganalysis of LSB matching based on wavelet denoising estimation in grayscale image[C]. International Conference on Future Generation Communication and Networking, 2008, 1: 106-109.
[6] Pevn T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[C]. International Conference on Information Hiding, 2010: 161-177.
[7] Filler T, Fridrich J. Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720.
[8] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2012, 5(2): 201-214.
[9] Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]. IEEE International Workshop on Information Forensics and Security, 2012: 234-239.
[10] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1): 1-13.
[11] Li B, Wang M, Huang J, et al. A new cost function for spatial image steganography[C]. IEEE International Conference on Image Processing (ICIP), 2015: 4206-4210.
[12] Al-Shatanawi O M, Emam N N E. A new image steganography algorithm based on MLSB method with random pixels selection[J]. International Journal of Network Security & Its Applications, 2015, 7(2): 37-53.
[13] Sedighi V, Cogranne R, Fridrich J. Content-adaptive steganography by minimizing statistical detectability[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(2): 221-234.
[14] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensicsand Security, 2011, 6(3): 920-935.
[15] Pevn T, Bas P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix[J]. IEEE Transactions on Information Forensicsand Security, 2010, 5(2): 215-224.
[16] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 868-882.
[17] Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks[C]. Proceedings of SPIE, 2015, 9409: 94090J.
[18] Xu G, Wu H Z, Shi Y Q. Ensemble of CNNs for steganalysis: an empirical study[C]. The 4th ACM Workshop on Information Hiding and Multimedia Security, 2016: 103-107.
[19] Xu G, Wu H Z, Shi Y Q. Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5): 708-712.
[20] Fridrich J, Filler T. Practical methods for minimizing embedding impact in steganography[C]. SPIE, 2007, 6505: 650502.
[21] Bas P, Filler T, Pevn T. Break our steganographic system: the ins and outs of organizing BOSS[C]. International Conference on Information Hiding, 2011: 59-70.
[22] Kodovsk J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 432-444.