[[1] KOŠDY, M.: Steganographic File System based on JPEG Files: Master’s Thesis, FEI STU, Bratislava, 2013.]Search in Google Scholar
[[2] JÓKAY, M.—MORAVČÍK, T.: Image-based JPEG steganography, Tatra Mt. Math. Publ. (45) (2010), 65–74.10.2478/v10127-010-0006-9]Search in Google Scholar
[[3] BÖHME, R.: Advanced Statistical Steganalysis, Springer-Verlag, Berlin, 2010.10.1007/978-3-642-14313-7]Search in Google Scholar
[[4] ZHANG, W.—LI, S.: Security measurements of steganographic systems in: Applied Cryptography and Network Security (ACNS) (M. Jakobsson, M. Yung, J. Zhou, Eds.), Lecture Notes in Comput. Sci. Vol. 3089, Springer-Verlag Berlin, 2004, pp. 194–204.]Search in Google Scholar
[[5] CHANDRAMOULI, R.—KHARRAZI, M.—MEMON, N.: Image steganography: concepts and practice, in: International Workshop on Digital Watermarking, 2003, pp. 35–49.10.1007/978-3-540-24624-4_3]Search in Google Scholar
[[6] JUIN-DE HUANG: The JPEG Standard, in: National Taiwan University, Taipei, Taiwan, ROC, http://slideplayer.com/slide/8779307/]Search in Google Scholar
[[7] FRIDRICH, J.—GOLJAN, M.—HOGEA, D.: Steganalysis of JPEG images: breaking the F5 algorithm, in: Information Hiding: 5th International Workshop, IH ’02, Noordwijkerhout, The Netherlands, October 7–9, 2002, Springer-Verlag, Berlin, Heidelberg, 2003, pp. 310–323. (Revised papers)10.1007/3-540-36415-3_20]Search in Google Scholar
[[8] FRIDRICH, J.—KODOVSKÝ, J.: Calibration revisited in: ACM New York, NY, USA, 2009, pp. 63–74.10.1145/1597817.1597830]Search in Google Scholar
[[9] ZHANG, W.—ZHANG, X.—WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming codes and Wet paper codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60–71.10.1007/978-3-540-88961-8_5]Search in Google Scholar
[[10] FRIDRICH, J.: Steganography in Digital Media: Principles, Algorithms and Applications, Cambridge University Press, U.K., 2010.10.1017/CBO9781139192903]Search in Google Scholar
[[11] FRIDRICH, J.—GOLJAN, M.: Practical steganalysis of digital images-state of the art, in: Proceedings of SPIE, 2002, pp. 1–13.10.1117/12.465263]Search in Google Scholar
[[12] FRIDRICH, J.—GOLJAN, M.—DU, R.: Reliable of LSB steganography in color and grayscale images. in: Proceeding MM&Sec ’01, Workshop on Multimedia and Security: New Challenges 2001, pp. 27–30, http://parsys.informatik.uni-oldenburg.de/~stego/workshopStatistik/g1/RS_Steganalysis.pdf10.1145/1232454.1232466]Search in Google Scholar
[[13] GULÁŠOVÁ, M.—JÓKAY, M.: Steganalysis of StegoStorage system. Tatra Mt. Math. Publ. 64 (2014), 205–2015.]Search in Google Scholar