5Luo X Y, Wang D S, Wang P, et al. A review on blind detection for image steganography[J]. Signal Processing, 2008, 88(9): 2138-2157.
6Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis of spread spectrum data hiding exploiting cover memory[C]//Conference on Security, Steganography and Watermarking of Multimedia Contents VII: vol.5681. Bellingham, WA, USA: SPIE, 2005: 38-46.
7Xuan G R, Shi Y Q, Gao J J, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[M]//Lecture Notes in Computer Science: vol.3727. Berlin, Germany: Springer, 2005: 262-277.
8Cachin C. An information-theoretic model for steganography[J]. Information and Computation, 2004, 192(1): 41-56.
9Wang Y, Moulin R Steganalysis of block-structured stegotext [C]//Conference on Security, Steganography and Watermarking of Multimedia Contents Ⅵ: vol.5306. Bellingham, WA, USA: SPIE, 2004: 477-488.
10Sullivan K, Madhow U, Chandrasekaran S, et al. Steganalysis for Markov cover data with applications to images[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 275-287.