1 박태희, "웨이블렛 부밴드의 조인트 모멘트를 이용한 스테그분석" 대한전자공학회 48 (48): 71-78, 2011
2 박태희, "스테고 잡음 확대를 위한 영상 분해와 동시 발생 확률에 기반한 스테그분석" 대한전자공학회 49 (49): 94-101, 2012
3 박태희, "곱셉 잡음 첨가를 이용한 스테그분석의 성능 개선" 대한전자공학회 49 (49): 23-30, 2012
4 "http://en.wikipedia.org/wiki/Steganography"
5 T. Pevny, "Steganalysis by subtractive pixel adjacency matrix" 5 : 215-224, 2010
6 G. R. Xuan, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions" 3727 : 262-277, 2005
7 I. J. Cox, "Secure spread spectrum watermarking for multimedia" 6 : 1673-1687, 1997
8 J. Fridrich, "Rich models for steganalysis of digital images" 7 : 868-882, 2012
9 Y. Wang, "Optimized feature extraction for learning-based image steganalysis" 2 (2): 31-45, 2007
10 X. Luo, "On the typical statistic features for image blind steganalysis" 29 : 1404-1422, 2011
1 박태희, "웨이블렛 부밴드의 조인트 모멘트를 이용한 스테그분석" 대한전자공학회 48 (48): 71-78, 2011
2 박태희, "스테고 잡음 확대를 위한 영상 분해와 동시 발생 확률에 기반한 스테그분석" 대한전자공학회 49 (49): 94-101, 2012
3 박태희, "곱셉 잡음 첨가를 이용한 스테그분석의 성능 개선" 대한전자공학회 49 (49): 23-30, 2012
4 "http://en.wikipedia.org/wiki/Steganography"
5 T. Pevny, "Steganalysis by subtractive pixel adjacency matrix" 5 : 215-224, 2010
6 G. R. Xuan, "Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions" 3727 : 262-277, 2005
7 I. J. Cox, "Secure spread spectrum watermarking for multimedia" 6 : 1673-1687, 1997
8 J. Fridrich, "Rich models for steganalysis of digital images" 7 : 868-882, 2012
9 Y. Wang, "Optimized feature extraction for learning-based image steganalysis" 2 (2): 31-45, 2007
10 X. Luo, "On the typical statistic features for image blind steganalysis" 29 : 1404-1422, 2011
11 C. Liu, "Image steganalysis based on spatial domain and DWT domain features" 329-331, 2010
12 Q. Liu, "Image complexity and feature mining for steganalysis of least significant bit matching steganography" 178 : 21-36, 2008
13 A. Cheddad, "Digital image steganography : Survey and analysis of current methods" 90 : 727-752, 2010
14 I. H. WITTEN, "Data Mining" Elservier 2005
15 "CorelDraw Software"
16 K. S. Vijay, "A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection" 36 (36): 2012
17 T. Zhang, "A new approach to reliable detection of LSB steganography in natural images" 83 (83): 2085-2093, 2003