[1] S. Dumitrescu, X. Wu, and N. Memon. On steganalysis of random lsb embedding in continuoustone images. In Proceedings IEEE International Conference on Image Processing, ICIP 2002, pages 324-339, Rochester, NY, September 22-25, 2002.
[2] J. Fridrich, R. Du and L. Meng. Steganalysis of lsb encoding in color images. In Proceedings IEEE International Conference on Multimedia and Expo, July 30-August 2, New Yourk, NY, 2000.
[3] S.R. Khosravi-rad, T. Eghlidos, and S. Ghaemmaghami. Higher-order statistical steganalysis of random lsb steganography. In IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pages 629-632, May 2009.
[4] G. Gul and F. Kurugollu. Svd-based universal spatial domain image steganalysis. IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, JUNE 2010.
[5] R.A. Horn and C.R. Johnson. Matrix analysis. Cambridge university press, 1990.
[6] J. Fridrich and M. Goljan. Practical steganalysis of digital images-state of the art. In Proceedings of SPIE, volume 4675, pages 1-13, 2002.
[7] J. Fridrich and M. Goljan. Reliable detection of lsb steganography in color and grayscale images. Proceedings ACM Workshop on Multimedia and Security, pages 27{30, 2001.
[8] J. Fridrich, M. Goljan, and D. Soukal. Higher- order statistical steganalysis of palette images. In Electronic Imaging 2003, pages 178-190. International Society for Optics and Photonics, 2003.
[9] A.D. Ker. Steganalysis of lsb matching in grayscale images. IEEE Signal Processing Letters, 12(6):441-444, 2005.
[10] A. Ker. A general framework for structural steganalysis of lsb replacement. In Proceedings of the 7th Information Hiding Workshop, volume 3727, pages 296-311. Springer, 2005.
[11] S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis. In IEEE Transactions on Signal Processing, vol. 51, no. 7, pages 1995-2007, 2003.
[12] S. Dumitrescu and X.Wu. Steganalysis of lsb embedding in multimedia signals. In IEEE International Conference on Multimedia and Expo, 2002. ICME02., volume 1, pages 581-584, August 2002.
[13] P. Lu, X. Luo, Q. Tang, and L. Shen. An improved sample pairs method for detection of lsb embedding. In Proceedings of the 6th Information Hiding Workshop, Springer LNCS 3200, pages 116-127, 2004.
[14] L.I. Smith. A tutorial on principal components analysis. Cornell University, USA, 2002.
[15] Boss website. http://www.agents.cz/boss/ BOSSFinal/.
[16] Nrcs website. http://photogallery.nrcs.usda.gov/.
[17] Nrcs website. http://wang.ist.psu.edu/docs/related/.
[18] D.L. Donoho and I.M. Johnstone. Adapting to unknown smoothness via wavelet shrinkage. Journal of the American statistical association, 90(432): 1200-1224, 1995.
[19] J. Mielikainen. Lsb matching revisited. IEEE Signal Processing Letter, 13(5):285-287, May 2006.
[20] H. Wu, J.L. Dugelay, and Y. Cheung. A data mapping method for steganography and its application to images. In Lecture notes in computer science. Proceedings of the 10th information hiding workshop, pages 236-250. Berlin:Springer, 2008.
[21] T. Pevny`, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Workshop, Lecture Notes in Computer Science, Calgary, Canada, pages 161-177. Springer, 2010.
[22] Patrick Bas, Tomáš Filler, and Tomáš Pevn y`. Break our steganographic system: The ins and outs of organizing boss. In Information Hiding, pages 59-70. Springer, 2011.