1. Shen, C., Zhang, H., Feng, D.: A survey of information security. Sci. China 37(2), 129–150 (2007)
2. Zhang, G., Yue, Y., Zhang, C.: Adaptive steganography algorithm of rapid wet paper code based on Hilbert. Comput. Eng. 39(7), 161–164 (2013)
3. Budhia, U., Kundur, D., Zourntos, T.: Digital video steganalysis exploiting statistical visibilityin the temporal domain. IEEE Trans. Inf. Forensics Secur. 1(4), 502–516 (2006)
4. Bai, Y., Bai, S., Liu, C.: Digital audio watermarking algorithm based on wavelet and cepstrum domain. Comput. Appl. Softw. 29(3), 163–167 (2012)
5. Fu, D., Chen, G., Yang, Q.: A covert communication method based on XML documents slicing. Comput. Appl. Softw. 28(9), 106–107 (2011)