1[3]Eggers J, Bauml R, Girod B. A communications approach to image steganography [A]. In: Proceedings of SPIE [C], 2002, 4675: 26-37.
2[4]Petitcolas F, Anderson R, Kuhn M. Information hiding - a survey [J]. Proceedings of the IEEE,1999,87(7):1062-1078.
3[5]Brown A. S-tools for windows [EB/OL]. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip,1996.
4[6]Machado R. Ezstego, stego online, stego [EB/OL]. http://www.stego.com,1997.
5[7]Hansmann F. Steganos, DeusEx machina communications [EB/OL]. http://www.steganography.com,1996.
6[8]Chen M, Wong E K, Memon N, et al. Recent developments in document image watermarking and data hiding [A]. In: Proceedings of SPIE [C]. 2001, 4518:166-175.
7[9]Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Pfitzmann A, ed. Information Hiding: Third International Workshop, LNCS[C]. Springer-Verlag,1999, 1768: 47-60.