2Westfeld A. F5-A Steganographic algorithm [ C ]//International Workshop on Information Hiding, LNCS. Springer-Verlag ,2001,2137:289 - 302.
3Niels Provos. Defending against Statistical Steganalysis [ C]//Proceedings of the lOth USENIX Security Symposium. USENIX Press,2001:323 - 335.
4P Sallee, Model-Based Steganography[ C ]//International Workshop on Digital Watermarking. Springer-Verlag. 2004,2939 : 154 - 167.
5Fridrich J, Goljan M, Hogea D. Steganalysis of JPEG Images : Breaking the F5 Algorithm [ C]//Proceeding of the 5th Information Hiding Workshop. 2002, 2578:310 - 323.
6Dongdong Fu, Yun Q Shi, Dekun Zou, et al, JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain [ C ]//International Workshop on Multimedia Signal Processing ( MMSP2006). 2006:310 - 313.