[1] Wikipedia Encyclopedia, “Steganography,” [Online]. Available: http://en.wikipedia.org/wiki/Steganography.
[2] G. J. Simmons, “The prisoner’s problem and the subliminal channel,” Advances in Cryptology, CRYPTO ’83, pp. 51–67, 1983.
[3] A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný, “Moving steganography and steganalysis from the laboratory into the real world,” 1st ACM IH&MMSec. Workshop, Montpellier, France, 2013.
[4] C. Cachin, “An information-theoretic model for steganography,” Information and Computation, vol. 192, no. 1, pp. 41–56, 2004.
[5] J. Fridrich, “Steganography in Digital Media: Principles,” Algorithms, and Applications. Cambridge University Press, 2009.
[6] R. Böhme, “Advanced Statistical Steganalysis,” Springer Berlin Heidelberg, 2010.
[7] B. Li, J. He, J. Huang, and Y. Q. Shi, “A survey on image steganography and steganalysis,” Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142–172, April 2011.
[8] T. Pevn´y and J. Fridrich, “Benchmarking for steganography,” in 10th International Workshop on Information Hiding, vol. LNCS 5284, Springer Berlin Heidelberg, pp. 251–267, 2008.
[9] A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, “The Square Root Law of steganographic capacity,” In Proceedings of the 10th ACM Multimedia & Security Workshop, pp. 107–116, Oxford, UK, 2008.
[10] T. Filler, A. D. Ker, and J. Fridrich, “The Square Root Law of steganographic capacity for Markov covers,” In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, vol. 7254, pp. 1–11, San Jose, CA, 2009.
[11] T. Filler and J. Fridrich, “Fisher information determines capacity of ԑ-secure steganography,” In Information Hiding, 11th International Workshop, vol. 5806 LNCS, pp. 31–47, Darmstadt, Germany, 2009.
[12] A. D. Ker, “Estimating steganographic fisher information in real images,” in 11th International Workshop on Information Hiding, vol. LNCS 5806, Springer Berlin Heidelberg, pp. 73–88, 2009.
[13] N. Provos, “Defending against statistical steganalysis,” in 10th USENIX Security Symposium, pp. 323–335, 2001.
[14] A. Westfeld, “F5—a steganographic algorithm,” in 4th International Workshop on Information Hiding, vol. LNCS 2137, Springer Berlin Heidelberg, pp. 289–302, 2001.
[15] X. Zhang, S. Wang, and K. Zhang, “Steganography with least histogram abnormality,” in Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, vol. LNCS 2776, Springer Berlin Heidelberg, pp. 395–406, 2003.
[16] P. Sallee, “Model-based steganography,” in Second International Workshop on Digital Watermarking, vol. LNCS 2939, Springer Berlin Heidelberg, pp. 154–167, 2003.
[17] A. Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran, and B. Manjunath, “Secure steganography: Statistical restoration of the second order dependencies for improved security,” in IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 2, pp. II–277– 280, 2007.
[18] J. Kodovsk and J. Fridrich, “On completeness of feature spaces in blind steganalysis,” in Proceedings of the 10th ACM multimedia workshop on Multimedia and security, pp. 123–132, 2008.
[19] V. K. Chonev and A. D. Ker, “Feature restoration and distortion metrics,” in Media Watermarking, Security, and Forensics XIII, Proc. SPIE, vol. 7880, pp. 0G01–0G14, 2011.
[20] R. Crandall, “Some notes on steganography,” Steganography Mailing List, 1998.
[21] F. Galand, and G. Kabatiansky, “Information hiding by coverings,” In Proceedings ITW2003, pp. 151-154, 2003.
[22] M. van Dijk, and F. Willems, “Embedding information in grayscale images,” In Proceedings of the 22nd Symposium on Information and Communication Theory, pp. 147–154, 2001.
[23] J. Fridrich and D. Soukal, “Matrix embedding for large payloads,” IEEE Trans. Inf. Forensics Security, vol. 3, pp. 390-394, 2006.
[24] J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proc. SPIE, vol. 6505, pp. 0201–0215, 2007.
[25] T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in 12th International Workshop on Information Hiding, vol. LNCS 6387, pp. 161–177, 2010.
[26] T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 4, pp. 705–720, 2010.
[27] F. Huang, J. Huang, and Y.-Q. Shi, “New channel selection rule for jpeg steganography,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1181–1191, 2012.
[28] L. Guo, J. Ni, and Y. Q. Shi, “An efficient jpeg steganographic scheme using uniform embedding,” in IEEE International Workshop on Information Forensics and Security, pp. 169–174, 2012.
[29] V. Holub, and J. Fridrich, “Designing steganographic distortion using directional filters,” in IEEE Workshop on Information Forensic and Security, pp. 234–239, 2012.
[30] V. Holub and J. Fridrich, “Digital image steganography using universal distortion,” in Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 59–68, 2013.
[31] J. Fridrich and J. Kodovský, “Multivariate gaussian model for designing additive distortion for steganography,” in IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, Canada, pp. 2949–2953, 2013.
[32] J. Fridrich, M. Goljan, D. Soukal, and P. Lisonek, “Writing on wet paper,” In IEEE Transactions on Signal Processing, Special Issue on Media Security, vol. 53, pp. 3923–3935, 2005.
[33] Y. Kim, Z. Duric, and D. Richards, “Modified matrix encoding technique for minimal distortion steganography,” in 8th International Workshop on Information Hiding, vol. LNCS 4437, Springer Berlin Heidelberg, pp. 314–327, 2007.
[34] R. Zhang, V. Sachnev, and H. Kim, “Fast bch syndrome coding for steganography,” in 11th International Workshop on Information Hiding, vol. LNCS 5806, Springer Berlin Heidelberg, pp. 48–58, 2009.
[35] W. Zhang, X. Zhang, and S. Wang, “Near-optimal codes for information embedding in gray-scale signals,” IEEE Trans. Inf. Theory, vol. 56, no. 3, pp. 1262–1270, 2010.
[36] T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3-2, pp. 920–935, 2011.
[37] T. Pevn´y, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215–224, 2010.
[38] J. Fridrich and J. Kodovsk´y, “Rich models for steganalysis of digital images,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868– 882, 2012.
[39] P. Moulin and Y. Wang, “New results on steganographic capacity,” In Proceedings of the Conference on Information Sciences and Systems, CISS, Princeton, NJ, 2004.
[40] T. Filler, “Imperfect stegosystems-asymptotic laws and near-optimal practical constructions,” Dissertation, Binghamton University State University of New York, 2011.
[41] J. Fridrich, “Effect of cover quantization on steganographic fisher information,” IEEE Transactions on Information Forensics and Security, 2013.
[42] T. Pevný, J. Fridrich, and A. D. Ker, “From blind to quantitative steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 445–454, 2012.
[43] C. Corporation, “Corel stock photo library 3, Ontario, Canada.
[44] J. Zhang, I. Cox, and G. Doerr, “Steganalysis for LSB matching in images with high frequency noise,” IEEE 9th Workshop on Multimedia Signal Processing, pp. 385–388, 2007.
[45] D. Blei, A. Ng, and M. Jordan, “Latent Dirichlet allocation,” Journal of Machine Learning Research, vol. 3, pp. 993-1022, 2003.
[46] V. Sedighi, R. Cogranne, and J. Fridrich, “Content-Adaptive Steganography by Minimizing Statistical Detectability,” IEEE TIFS, vol. 11, no. 2, pp. 221-234, 2016.
[47] M. Shamalizade, Z. Nowrouzi, M. Sabzinejad, and M. Karami, “Adaptive Image Steganography based on Graph Entropy with Improved Securitye Effectivity,” Advanced Defence Sci. & Tech., Journal, 5 July 2017. (In Persian)
[48] J. Kodovský, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432–444, 2012.
[49] X. Wang, C. Chang, C. Lin, and M. Chu Li, “A novel multi-group exploiting modification direction method based on switch map,” Signal Process, vol. 92, pp. 1525–1535, 2012.