References
[1]
Zhang
W M,
Li
S Q.
Wuhan Univ J Nat Sci,
2005, 10: 315-318
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Zhang W M&author=Li S Q&publication_year=2005&journal=Wuhan Univ J Nat Sci&volume=10&pages=315-318
[2]
Regalia
P A.
IEEE Trans Inf Forens Secur,
2008, 3: 786-791
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Regalia P A&publication_year=2008&journal=IEEE Trans Inf Forens Secur&volume=3&pages=786-791
[3]
Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691--695.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691--695&
[4]
Chen
J Y,
Liu
J F,
Zhang
W M, et al.
Int J Comput Intell Syst,
2013, 6: 639-647
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Chen J Y&author=Liu J F&author=Zhang W M&publication_year=2013&journal=Int J Comput Intell Syst&volume=6&pages=639-647
[5]
Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70--82.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70--82&
[6]
Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, 2005. 631--642.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fridrich J, Goljan M, Soukal D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography. In: Proceedings of SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, 2005. 631--642&
[7]
Zhang
W M,
Liu
J F,
Li
S Q.
Acta Sci Nat Univ Sunyatseni,
2005, 44: 29-33
Google Scholar
http://scholar.google.com/scholar_lookup?author=Zhang W M&author=Liu J F&author=Li S Q&publication_year=2005&journal=Acta Sci Nat Univ Sunyatseni&volume=44&pages=29-33
[8]
Zhang
W M,
Li
S Q,
Liu
J F.
Chin J Comput,
2007, 30: 1625-1631
Google Scholar
http://scholar.google.com/scholar_lookup?author=Zhang W M&author=Li S Q&author=Liu J F&publication_year=2007&journal=Chin J Comput&volume=30&pages=1625-1631
[9]
Liu
J,
Tang
G M.
J Multimedia,
2012, 7: 309-313
Google Scholar
http://scholar.google.com/scholar_lookup?author=Liu J&author=Tang G M&publication_year=2012&journal=J Multimedia&volume=7&pages=309-313
[10]
Zhang
W M,
Li
S Q,
Liu
J F.
Acta Electron Sin,
2007, 35: 2258-2261
Google Scholar
http://scholar.google.com/scholar_lookup?author=Zhang W M&author=Li S Q&author=Liu J F&publication_year=2007&journal=Acta Electron Sin&volume=35&pages=2258-2261
[11]
Chen
J Y,
Zhu
Y F,
Zhang
W M, et al.
J Commun,
2010, 31: 73-80
Google Scholar
http://scholar.google.com/scholar_lookup?author=Chen J Y&author=Zhu Y F&author=Zhang W M&publication_year=2010&journal=J Commun&volume=31&pages=73-80
[12]
Zhang
J,
Zhang
D.
IEEE Signal Process Lett,
2010, 17: 141-144
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Zhang J&author=Zhang D&publication_year=2010&journal=IEEE Signal Process Lett&volume=17&pages=141-144
[13]
Luo
W Q,
Wang
Y G,
Huang
J W.
IEEE Signal Process Lett,
2011, 18: 39-42
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Luo W Q&author=Wang Y G&author=Huang J W&publication_year=2011&journal=IEEE Signal Process Lett&volume=18&pages=39-42
[14]
Li
X,
Zhang
T,
Zhang
Y, et al.
Multimed Tools Appl,
2014, 68: 1051-1068
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Li X&author=Zhang T&author=Zhang Y&publication_year=2014&journal=Multimed Tools Appl&volume=68&pages=1051-1068
[15]
Li
X,
Zhang
T,
Zhang
Y, et al.
Multimed Tools Appl,
2014, 73: 1487-1506
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Li X&author=Zhang T&author=Zhang Y&publication_year=2014&journal=Multimed Tools Appl&volume=73&pages=1487-1506
[16]
Luo
W Q,
Huang
J W,
Qiu
G P.
IEEE Trans Inf Forens Secur,
2010, 5: 480-491
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Luo W Q&author=Huang J W&author=Qiu G P&publication_year=2010&journal=IEEE Trans Inf Forens Secur&volume=5&pages=480-491
[17]
Liu
J F,
Tian
Y G,
Han
T, et al.
Digit Signal Process,
2015, 38: 66-76
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?author=Liu J F&author=Tian Y G&author=Han T&publication_year=2015&journal=Digit Signal Process&volume=38&pages=66-76