[1] Stegoarchive.com, 2009. Available at: http://stegoarchive.com.
[2] Neil F. Johnson. Steganography tools, 2009.mAvailable at: http://www.jjtc.com/Security/stegtools.htm.
[3] N. Provos. Defending Against Statistical Steganalysis. In Proceedings of the 10th USENIX Security Symposium, pages 323-335, Washington DC, USA, 2001.
[4] P. Sallee. Model-based Methods for Steganography and Steganalysis. International Journal of Image and Graphics (IJIG), 5(1):167-190, 2005.
[5] A. Westfeld. F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Proceedings of the 4th Internation Workshop on Information Hiding (IH'01), volume 2137 of Lecture Notes in Computer Science (LNCS), pages 289-302, Pittsburgh, PA, USA, 2001. Springer Verlag.
[6] J. Fridrich, M. Goljan, and D. Soukal. Perturbed Quantization Steganography with Wet Paper Codes. In Proceedings of the ACM Workshop on Multimedia and Security, pages 4-15, Magdeburg, Germany, 2004.
[7] R. Chandramouli,M. Kharrazi, and N. D. Memon. Image Steganography and Steganalysis: Concepts and Practice. In Proceedings of the 2nd International Workshop on Digital Watermarking (IWDW'03), volume 2939 of Lecture Notes in Computer Science (LNCS), pages 209-211, Seoul, Korea, 2003. Springer Verlag.
[8] H. Farid and S. Lyu. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In Proceedings of the 5th International Workshop on Information Hiding, volume 2578 of Lecture Noted in Computer Science (LNCS), pages 340{354, Noordwijkerhout, Netherlands, 2002. Springer Verlag.
[9] Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen. Steganalysis Based on Moments of Characteristic Functions Using Wavelet Decomposition, Prediction-Error Image, and Neural Network. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME05), Amsterdam, Netherlands, 2005.
[10] J. Fridrich. Feature-Based Steganalysis for JPEG Images and Its Implications. In Proceedings of the 6th International Workshop on Information
Hiding (IH'04), volume 3200 of Lecture Notes in Computer Science (LNCS), pages 67-81, Toronto, Canada, 2005. Springer Verlag.
[11] M. Kharrazi, H. T. Sencar, and N. Memon. Performance Study of Common Image Steganography and Steganalysis Technique. Journal of Electronic Imaging, 15(4):041104-1-041104-16, 2006.
[12] G. Gkhan, E. D. Ahmet, and I. Avcibas. Steganalytic Features for JPEG Compression-Based Perturbed Quantization. IEEE Signal Processing Letters, 14(3):205-208, 2007.
[13] K. Sullivan, U. Madhow, S. Chandrasekaran, and B. S. Manjunath. Steganalysis for Markov Cover Data with Applications to Images. IEEE Transactions on Information Forensics and Security, 1(2):275-287, 2006.
[14] T. Pevny and J. Fridrich. Merging Markov and DCT Features for Multi-Class JPEG Steganalysis. In Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 650503.1-650503.13, San Jose, CA, USA, 2007.
[15] Y. Q. Shi, C. Chen, and W. Chen. A Markov Process Based Approach to Effective Attacking JPEG Steganography. In Proceedings of the 8th International Workshop on Information Hiding (IH'06), volume 4437 of Lecture Notes in Computer Science (LNCS), pages 249-264, Alexandria, VA, USA, 2006. Springer Verlag.
[16] M. Abolghasemi, H. Aghainia, and K. Faez. Steganalysis of Perturbed Quantization (PQ) Steganography Based on Markov Chain Model. In Proceedings of the 17th Iranian Conference on Electrical Engineering (ICEE'09), pages 620-625, Tehran, Iran, 2009.
[17] M. Abolghasemi, H. Aghainia, K. Faez, and M.A Mehrabi. Steganalysis of LSB Matching Based on Co-occurrence Matrix and Removing Most Significant Bit Planes. In Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 1527-1530, Harbin, China, 2008.
[18] R. M. Haralick. Textural Features for Image Classification. IEEE Transactions on Systems, Man and Cybernatics SMC-3, SMC-3(6):610-621, 1973.
[19] Free Stock Photos, 2009. Available at: www.freephotos.com.