[[1] KOŠDY, M.: Steganographic File System Based on JPEG Files: Master’s Thesis. FEI STU, Bratislava, 2013.]Search in Google Scholar
[[2] BÖHME, R.: Advanced Statistical Steganalysis. Springer-Verlag, Berlin, 2010.10.1007/978-3-642-14313-7]Search in Google Scholar
[[3] ZHANG, W.-LI, S.: Security measurements of steganographic systems, in: Proc. of the 2nd Internat. Conf. Applied Cryptography and Network Security-ACNS ’04 (M. Jakobsson et al., eds.), Yellow Mountain, China, 2004, Lecture Notes in Comput. Sci., Vol. 3089, Springer-Verlag, Berlin, 2004, pp. 194-204.]Search in Google Scholar
[[4] KHARRAZI,M.-SENCAR, H.-MEMON, N.: Image steganography: concepts and practice, http://www2.ims.nus.edu.sg/preprints/2004-25.pdf, 2004.]Search in Google Scholar
[[5] CHANDRAMOULI, R.-KHARRAZI,M.-MEMON, N.: Image steganography: concepts and practice, in: Proc. of the 2nd Internat. Workshop-IWDW ’03, Seoul, Korea, 2003 (T. Kalker et al., eds), Lecture Notes in Comput. Sci., Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.]Search in Google Scholar
[[6] GROŠEK, O.-VOJVODA, M.-ZAJAC, P.: Classical Ciphers. Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, 2007.]Search in Google Scholar
[[7] MORAVČÍK, T.: Steganografia v obrazovom sbore JPG: master’s thesis. FEI STU, Bratislava, 2013.]Search in Google Scholar
[[8] STANLEY, C.: Pairs of Values and the Chi-Ssquare Attack. Department of Mathematics, Iowa State University, 2010.]Search in Google Scholar
[[9] FRIDRICH, J.-GOLJAN, M.-HOGEA, D.: Steganalysis of JPEG images: breaking the F5 algorithm, in: 5th Internat. Workshop-IH ’02 (F.A.P. Petitcolas, ed.), Noordwijkerhout, The Netherlands, 2002, Lecture Notes in Comput. Sci., Vol. 2578, Springer-Verlag, Berlin, 2003, pp. 310-323.]Search in Google Scholar
[[10] FRIDRICH, J.-KODOVSKÝ, J.: Calibration Revisited. ACM, New York, NY, USA, 2009.10.1145/1597817.1597830]Search in Google Scholar
[[11] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming codes and Wet paper codes, in: Proc. of the 10th Internat. Workshop-IH ’08 (K. Solanki et al., eds.), Lecture Notes in Comput. Sci., Vol. 5284, Springer-Verlag, Berlin, 2008, pp. 60-71.]Search in Google Scholar