共 14 条
[1]
[Anonymous], 2001, P 2001 WORKSH MULT S
[2]
Böhme R, 2008, LECT NOTES COMPUT SC, V5284, P178
[3]
Dasgupta D., 1998, Artificial Immune Systems and Their Applications
[4]
Evsyutin O.O., 2017, ELEKT SREDSTVA SIST, P79
[5]
Fridrich J, 2003, LECT NOTES COMPUT SC, V2578, P310
[6]
Goldbloom A., DATASETS
[7]
New Approach to Steganography Detection via Steganalysis Framework
[J].
PROCEEDINGS OF THE SECOND INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'17), VOL 1,
2018, 679
:496-503
[9]
Steganalysis of JPEG Images Using Rich Models
[J].
MEDIA WATERMARKING, SECURITY, AND FORENSICS 2012,
2012, 8303
[10]
Lu TL, 2017, 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), P531, DOI 10.1109/SPAC.2017.8304335