[1]
I Avcibas, N Memon, B Sankur. Steganalysis using image quality metrics. IEEE Transactions on Image Processing. 12(2003): 221-229.
DOI: 10.1109/tip.2002.807363
Google Scholar
[2]
H Farid, S W Lyu. Detecting hidden messages using higher-order statistics and support vector machines, in: Proceedings of 5th International Workshop on Information Hiding, Lecture Notes in Computer Science. Noordwijkerhout, the Netherlands, (2002).
DOI: 10.1007/3-540-36415-3_22
Google Scholar
[3]
Bayram S, Dirik a E, Sencar H T, et al. An Ensemble of Classifiers Approach to Steganalysis. CHEN C H, SHI Y Q. JPEG image steganalysis utilizing both inter-block and inter-block correlations∥IEEE International Symposium on Circuits and Systems. Seattle, Washington, USA: IEEE. (2008).
DOI: 10.1109/iscas.2008.4542096
Google Scholar
[4]
H Aly. Data hiding in motion vectors of compressed video based on their associated prediction error, IEEE Trans. Inf. Forensics Secur. 6 (2011) 14-18.
DOI: 10.1109/tifs.2010.2090520
Google Scholar
[5]
Information on http: /compression. ru/video/stego_video/index_en. html.
Google Scholar
[6]
Dengyin Zhang, Guangshuai Shi, et al. CN Patent 201410056321. 3. (2014).
Google Scholar
[7]
Hsu C T, Wu J L. DCT-based watermarking for video, IEEE Transactions on Consumer Electronics. 44 (1998) 206-216.
DOI: 10.1109/30.663749
Google Scholar