1. High-performance JPEG steganography using complementary embedding strategy;Liu;Pattern Recognit.,2008
2. N. Provos, Defending against statistical steganalysis, in: 10th USENIX Security Symposium, August 13–17, 2001, Washington, D.C., USA,
3. A high capacity steganographic method based on quantization table modification and F5 algorithm;Jiang;Circuits Syst. Signal Process.,2014
4. Model-based steganography;Sallee,2003
5. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities;Fridrich,2007