M. A. Akhaee, A. Amini, G. Ghorbani, and F. Marvasti, A solution to gain attack on water marking systems: Logarithmic homogeneous rational dither modulation, Proc. of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1312-1316, 2010.
 P. Comesaa and F. Perez-Gonalez, Dither modulation in the logarithmic domain, Proc. of International Workshop in Digital Watermarking (IWDW’07), Guangzhou, China, Dec. 2007.
 P. Comesata and F. Perez-Gonzalez, On a watermarking scheme in the logarithmic domain and its perceptual advantages, Proc. of International Conference on Image Processing (ICIP’07), pp. 2036-2039, 2007.
 U. Erez and R. Zamir, Achieving (1=2log(1+SNR) on the AWGN channel with lattice encoding and decoding, IEEE Trans. on Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
 P. Moulin and R. Koetter, Data-hiding codes, IEEE Trans. on Signal Process., vol. 93, no. 12, pp. 2081-2127, Dec. 2005.
 R. Tzschoppe, R. Bahml, R. Fischer, A. Kaup, and J. Huber, Additive non-Gaussian attacks on the scalar costa scheme, in Proc. SPIE, San Jose, CA, Jan. 2005.
 P. Moulin, and A. K. Goteti, Block QIM watermarking games, IEEE Trans. on Inf. Forensics and Security, vol. 1, no. 3, pp. 293-310, Sept. 2006.
 N. K. Kalantari, S. M. Ahadi, A logarithmic quantization index modulation for perceptually better data hiding, Image Processing, IEEE Transactions on, vol. 19, no. 6, pp. 1504,1517, June 2010.
 W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems, vol. 35, no. 3, pp. 313-336, 1996.
 M. Arnold, Audio watermarking: Features, applications and algorithms, IEEE International Conference Multimedia and Expo, vol. 2, pp. 1013-1016, 2008.
 I. K. Yeo and H. J. Kim, Modified patchwork algorithm: A novel audio watermarking scheme, IEEE Trans. on Speech, Audio, and Language Process., vol. 11, no. 4, pp. 381-386, Jul. 2003.
 I. K. Yeo, H. J. Kim Generalized patchwork algorithm for image watermarking, Multimedia Systems, vol. 9, no. 3, pp. 261-265, 2003.
 H. Malik, R. Ansari, and A. Khokhar, Robust data hiding in audio using allpass filters, IEEE Trans. on Audio, Speech, and Language Process., vol. 15, no. 4, pp. 1296-1304, May 2007.
 A. Takahashi, R. Nishimura, Y. Suzuki, Multiple watermarks for stereo audio signals using phase-modulation techniques, IEEE Trans. on Signal Process., vol. 53, no. 2 , pp. 806-815, Feb. 2005.
 D. Gruhl and W. Bender, Echo hiding, Proc. of Information Hiding Workshop, pp. 295-315, 1996.
 H. O. Oh, J. W. Seok, J. W. Hong, and D. H. Youn, New echo embedding technique for robust and imperceptible audio watermarking, Proc. of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2011-2014, 2001.
 C. Xu, J. Wu, Q. Sun, and K. Xin, Applications of digital watermarking technology in audio signals, J. Audio Eng. Soc., vol. 47, no. 10, Oct. 1999.
 B. S. Ko, R. Nishimura, and Y. Suzuki, Time-spread echo method for digital audio watermarking, IEEE Trans. on Multimedia, vol. 7 , no. 2 , pp. 212-221, Apr. 2005.
 O. T. C. Chen, W. C. Wu, Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme, IEEE Trans. on Audio, Speech, and Language Process., vol. 16, no. 3, pp. 629-638, Mar. 2008.
 I. J. Cox, M. L. Miller, and A. L. McKellips, Watermarking as communications with side information, Proceeding of the IEEE, 87, pp. 1127-1141, July 1999.
 A. B. Watson, J. Hu, and J. F. McGowan, III, DVQ: A digital video quality metric based on human vision, Journal Electronic Imaging, vol. 10, pp. 20-29, Jan. 2001.
 A. B. Watson, J. Y. Yang, J. A. Solomon, and J. Villasenor, Visibility of wavelet quantization noise, IEEE Trans. on Image Process., vol. 6, no. 8, pp. 1164-1175, Oct. 1997.
 I. J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, 1997.
 Q. Cheng and T.S. Huang, An additive approach to transform-domain information hiding and optimum detection structure, IEEE Trans. Multimedia, vol. 3, no. 3, pp. 273-284, 2001.
 P. Moulin and A. Ivanovic The zero-rate spread spectrum watermarking game, IEEE Trans. on Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
 H. O. Altun, A. Orsdemir, G. Sharma, and M. F. Bocko, Optimal spread spectrum watermark embedding via a multi-step feasibility formulation, IEEE Trans. Image Process., vol. 18, no. 2, pp. 371-386, Aug. 1999.
 L. M. Marvel, C. G. Boncelet, and C. T. Retter, Spread spectrum image steganography, IEEE Trans. on Signal Process., vol. 8, no. 8, pp. 1285-1293, Aug. 1999.
 S. P. Maity, and S. Maity, Multistage spread spectrum watermark detection, IEEE Signal Processing Lett., vol. 16, no. 4, Apr. 2009.
 M. Barni, F. Bartolini, A. De Rosa, and A. Piva, A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. Image Process., vol. 10, no. 5, pp. 755-766, 2001.
 Q. Cheng, and T. S. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 906-924, 2003.
 M. Barni, F. Bartolini, A. De Rosa, and A. Piva, Optimum decoding and detection of multiplicative watermarks, IEEE Trans. on Signal Process., vol. 51, no. 4, pp.1118-1123, 2003.
 T. M. Ng, H. Garg, Maximum likelihood detection in image watermarking using generalized gamma model, Proc. of 39th Asilomar Conference on Signals, Systemsand Computer, pp. 1680-1684, 2005.
 V. Solachidis, and I. Pitas, Optimal detector for multiplicative watermarks embedded in the DFT domain of non-white signals, EURASIP Journal on Applied Signal Processing, vol. 16, pp. 522-532, 2004.
 J. Wang, G. Liu, Y. Dai, and J. Sun, Locally optimum detection for Barni multiplicative watermarking in DWT domain, Signal Processing, vol. 88, pp. 117-130. 2008.
 M. N. Do, and M. Vetterli, The contourlet transform: An efficient directional multi-resolution image representation, IEEE Trans. on Image Process. vol. 14, no. 12, pp. 2091-2106, 2005.
 M. N. Do, and M. Vetterli, Framing pyramids, IEEE Trans. on Signal Process., pp. 23292342, Sep. 2003.
 M. A. Akhaee, N. Khademi-Kalantari, and F. Marvasti, Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling, Proc. of International Conference on Communications (ICC), 2009.
 M. A. Akhaee, N. K. Kalantari, F. Marvasti, Robust audio and speech watermarking using Gaussian and Laplacian modeling, Signal Processing, vol. 90, no. 8, pp. 2487-2497, August 2010.
 M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, and B. Sankur, Robust scaling-based image multiplicative watermarking technique using maximum likelihood decoder with optimum strength factor, IEEE Trans. on Multimedia, vol. 11, no 5, pp. 822-833, Aug. 2009.
 M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, Contourlet-based image watermarking using optimum detector in a noisy environment, IEEE Trans. on Image Process., vol.19, no.4, pp. 967-980, Apr 2010.
 N. K. Kalantari, S. M. Ahadi, M. Vafadust, M., A robust image watermarking in the ridgelet domain using universally optimum decoder, IEEE Trans. on Circuits and Systems for Video Technology, vol. 20, no. 3, pp. 396 -406, March 2010.
 M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, Universal optimum blind scaling based Watermarking using maximum likelihood decoder, Proc. of International Conference on Image Processing (ICIP), pp. 765-768, 2009.
 S. M. E. Sahraeian, M. A. Akhaee, F. Marvasti, Information hiding with optimal detector for highly correlated signals, Proc. of International Conference on Communications (ICC), 2009.
 J. J. Harmsen and W. A. Pearlman, Steganalysis of additive-noise modelable information hiding, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conf., vol. 5020, pp. 131-142, 2003.
 A. D. Ker, Steganalysis of lsb matching in grayscale images, IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441 - 444, Jun. 2005.
 X. Li, T. Zeng, and B. Yang, Detecting lsb matching by applying calibration technique for difference image, Proc. of the 10th ACM workshop on Multimedia and security, pp. 133-138, 2008.
 T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Trans. on Information Forensics and Security, vol. 5, no. 2, pp. 215 -224, Jun. 2010.
 H. Farid, Detecting hidden messages using higher-order statistical models, International Conference on Image Processing, vol. 2, pp. 905-908, 2002.
 I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Transactions on Image Process., vol. 12, no. 2, pp. 221-229, 2003.
 F. Huang, B. Li, and J. Huang, Attack lsb matching steganography by counting alteration rate of the number of neighborhood gray levels, Proc. of International Conference on Image Processing, pp. 401-404, 2007.
 Y. Wang and P. Moulin, Optimized feature extraction for learning-based image steganalysis, IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 31 -45, Mar. 2007.
 T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Transactions on Info. Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010.
 Y. Q. Shi, C. Chen, and W. Chen, A markov process based approach to effective attacking jpeg steganography, in Information Hiding. Springer, pp. 249-264, 2007.
 C. Chen and Y. Shi, Jpeg image steganalysis utilizing both intrablock and interblock correlations, Proc. of International Symposium on Circuits and Systems, pp. 3029-3032, 2008.
 T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 3, pp. 1117-1126 2007.
 J. Kodovsky, J. Fridrich, Steganalysis in high dimensions: fusing classifiers built on random subspaces, Proc. of SPIE Media Watermarking, Security, and Forensics III, pp. 23-26, 2011.
 Y. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, Proc. of International Conference on Multimedia and Expo(ICME), 2005.
 C. C. Chang and C. J. Lin, Libsvm: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/cjlin/libsvm.
 J. Kodovsky, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012.