[1] 王朔中, 张新鹏, 张开文. 数字密写和密写分
析) ) ) 互联网时代的信息战技术[M ] . 北京: 清华
大学出版社, 2005.
[2] C randa ll R. Som e no tes on steganography [ EB /OL].
http: / /os. in.f tu-dresden. de /~ westfeld/ cranda l.l
pd,f 1998.
[3] W estfe ld A. F5-A steganog raph ic a lgo rithm [ A ].
Proceedings o f the 4 th Internationa lWo rkshop on Inform
ation H id ing [ C ]. Berlin: Springer-Ver lag,
2001. 289- 302.
[4] B ierbrauer J, Fridr ich J. Constructing good cover ing
codes fo r applica tions in steg anography [ EB /OL]. h-t
tp: / /www. m ath. m tu. edu / ~ jb ierbra /HOMEZEUGS /
stegocov surveyOct06. ps, 2006.
[5] Fridr ich J, L isonek P, Soukal D. On steganographic
embedding effic iency [ A]. Proceed ings of the 8th InternationalWorkshop
on Inform ation H iding [ C]. Berlin:
Spr inger-Verlag, 2006. 282- 296.
[6] M unuera C. Steganography and error-correcting codes
[ J] . S igna lProcessing, 2007, 87( 4): 1528- 1533.
[7] Cohen G D, Honkala I, Litsyn S, et a.l Cover ing codes
[M ]. Amsterdam: North-H olland/E lsev ier, 1997.
[8] Sharp T. An im plem entation o f key-based dig ital signal
steg anog raphy [ A] . Proceed ing s o f the 4th Inte rnationalW
orkshop on Inform ation H id ing [ C ]. Be rlin:
Spr inge r-Ver lag, 2001. 13- 26.
[9] Fr idr ich J, L isonek P. G rid co lor ings in steganog raphy
[ J]. IEEE Trans on Inform ation Theory, 2007,
53( 2): 1547- 1549