[1]
Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis. Security, Steganography, and Watermarking of Multimedia Contents IX, Proc of the SPIE Electronic Imaging, Photonics West, San Jose, CA, United states, 2007,Vol.6505:28-40
DOI: 10.1117/12.696774
Google Scholar
[2]
Lie W N, Lin G S.A feature-based classification technique for blind image steganalysis[J].IEEE Transactions on Multimedia,2005,7(6):1007-1020.
DOI: 10.1109/tmm.2005.858377
Google Scholar
[3]
Lin G S, Yeh C H, Kuo C J. Data hiding domain classification for blind image steganalysis[C]// Lee D T.Proceedings of 2004 IEEE International Conference on Multimedia and Expo. 2004,1(3):907-910.
DOI: 10.1109/icme.2004.1394348
Google Scholar
[4]
Chiew K L, Pieprzyk J. Binary image steganographic classification based on multi- class Steganalysis[C]// Kwak J. Proceedings of 2010 Information Security, Practice and Experience, LNCS 6047. Berlin: Springer-Verlag,2010:341-358.
DOI: 10.1007/978-3-642-12827-1_25
Google Scholar
[5]
Quansen Sun,Shenggen Zeng, Maolon Yang. Journal of computer research and development,2005,42(4): 614-621.In Chinese.
Google Scholar
[6]
Turk M, Pent L A. Eigenfaces for Recognition[J]. Journal of Cognitive Neuro Science, 1991, 3(1): 71-86.
Google Scholar
[7]
Shi YQ, Chen CH, Chen W. A Markov process based approach to effective attacking JPEG steganography. In: Camenisch J, et al., eds. Proc. of the 8th Int'l Workshop on Information Hiding (IH 2006).LNCS 6387, Berlin: Springer-Verlag, 2007. 249−264.
DOI: 10.1007/978-3-540-74124-4_17
Google Scholar
[8]
Kodovský J, Fridrich J. Calibration revisited. In: Felten E, et al., eds. Proc. of the 11th ACM Workshop on Multimedia and Security (MM&Sec 2009). New York: ACM Press, 2009. 63−73.
DOI: 10.1145/1597817.1597830
Google Scholar
[9]
Wei Huang,Xianfeng Zhao,Dengguo Feng. Journal of software, 2012,23(7):1869−1879.In Chinese.
Google Scholar
[10]
Lingming He. Integration of SVM and applications in remote sensing classification [D]. Hang Zhou: Zhejiang University, 2006.In Chinese.
Google Scholar
[11]
Bing luo, Wei Gu, Wangli Lv.Computer Engineering, 2010, 36(2): 167-169.In Chinese.
Google Scholar
[12]
The USC-SIPI Image Database.http://sipi.usc.edu/database/database.php
Google Scholar
[13]
YFreund R.E.schapire.experiments with a New Boosting algorithrn. In Proeeedings of the 13th Iniemational Conference on Machine Leaming ,1996:148-156.
Google Scholar