References
- C.-C. Chang, T. D. Kieu, "A reversible data hiding scheme using complementary embedding strategy," Inform. Sci., vol. 180, no. 16, pp. 3045-3058, 2010. https://doi.org/10.1016/j.ins.2010.03.027
- C.-C. Chang, W.-L.Tai, C.-C. Lin, "A reversible data hiding scheme based on side match vector quantization," IEEE Trans. Circ. Syst. Video Technol., vol. 16, no. 10, pp. 1301-1308, 2006. https://doi.org/10.1109/TCSVT.2006.882380
- D.-C. Lou, J.-L.Liu, "Steganographic method for secure communications," Comput.Security, vol. 21, no. 5, pp. 449-460, 2012.
- D.-C. Lou, C.-H. Sung, "A steganographic scheme for secure communications based on the chaos and Euler theorem," IEEE Trans. Multimedia, vol. 6, no. 3, pp.501-509, 2004. https://doi.org/10.1109/TMM.2004.827493
- J. Mielikainen, "LSB Matching Revisited," IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
- D.-C. Lou, C.-L.Lin, C.-L.Liu, "Novel steganalysis chemes for BPCS steganography," Imaging Sci. J., vol. 56, no. 4, pp. 232-242, 2008. https://doi.org/10.1179/174313108X283964
- R. Petrovic, J. M. Winograd, K. Jemili, E. Metois, "Data hiding within audio signals," in Proc. of the 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services, pp. 88-95, 1999.
- A. A. Hanafy, G. I. Salama, Y. Z. Mohasseb, "A secure covert communication model based on video steganography," in Proc. of the 2008 IEEE Military Communications Conference, pp. 1-6, 2008.
- B.-S. Ko, R. Nishimura, Y. Suzuki, "Time-spread echo method for digital audio watermarking," IEEE Trans. Multimedia, vol. 7, no. 2, pp. 212-221, 2005. https://doi.org/10.1109/TMM.2005.843366
- B. Liu, F. Liu, C. Yang, Y. Sun, "Secure steganography in compressed video bitstreams," in Proc. of the 3rd International Conference on Availability, Reliability and Security, pp. 1382-1387, 2008.
- A.R.S Marcal, P.R. Pereira, "A steganographic method for digital images robust to RS staganalysis," in: International Conference on Image Analysis and Recognition, Toronto, Canada, Lecture Notes in Computer Science, vol. 3656, 2005, pp. 1192-1199.
- J. Frridrich, M. Goljan, R. Du, "Reliable detection of LSB steganography in color and grayscale images," in: Proceedings ACM Workshop Multimedia and Security, 2001, pp. 27-30.
- A. Nissar, A. H. Mir, "Classification of steganalysis techniques: A study"
- Wu, Dugelay, Cheung," A data mapping method for steganography and its application to images," in: 10th International Workshop on Information Hiding, vol. 5284, USA, May 2008, p. 236-250.
- KazemGhazanfari, GhaemmaghamiShahrokh, Saeed R. Khosravi, "LSB++: an improvement to LSB+ steganography," in: TENCON 2011-2011 IEEE Region 10 Conference, IEEE, 2011, pp. 364-368.
- W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on lsb matching revisited, IEEE Tans. Inf. Forens. Security.Vol. 5, no. 2, pp. 201-214, 2010. https://doi.org/10.1109/TIFS.2010.2041812
- J. Mielikainen, LSB Matching Revisited, IEEE Signal Process. Lett.Vol. 13, no. 5, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
- D. C Lou, C. H Hu, "LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis" Inform. Sci., vol. 188, pp. 346-358, 2012. https://doi.org/10.1016/j.ins.2011.06.003
- Mohsen Bazyar, Rubita Sudirman, A New Method to Increase the Capacity of Audio Steganography Based on the LSB Algorithm, JurnalTeknologi, 74: 6 (2015) 49-53.
- Wang R, Lin C, Lin J. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 2001; 34(3): 671-83. https://doi.org/10.1016/S0031-3203(00)00015-7
- Chang C, Hsiao J, Chan C. Finding optimal leastsignificant- bit substitution in image hiding by dynamic programming strategy. Pattern Recognit, 2003; 36(7): 1583-95. https://doi.org/10.1016/S0031-3203(02)00289-3
- Chan C, Cheng L. Hiding data in images by simple LSB substitution. Pattern Recognit 2004; 37(3): 469-74. https://doi.org/10.1016/j.patcog.2003.08.007
- El Safy R, Zayed H, El Dessouki A. An adaptive steganographic technique based on integer wavelet transform. In: International conference onnetworking and media convergence (ICNM 2009). IEEE; 2009. p. 111-7.
- Bhattacharyya S, Sanyal G. Data hiding in images in discrete wavelet domain using PMM. World Acad Sci Eng Tech 2010;68:597-605.
- Torres-Maya S, Nakano-Miyatake M, Perez-Meana H. n image steganography systems based on BPCS and IWT. In: 16th International conference onelectronics, communications and computers. IEEE; 2006. p. p. 51.
- Lin C, Shiu P. High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimedia Signal Process 2010; 1(3): 220-40.
- M. Ghebleh, A. Kanso, A robust chaotic algorithm for digital image steganography,Communications in Nonlinear Science and Numerical Simulation, Volume 19, Issue 6, June 2014, Pages 1898-1907. https://doi.org/10.1016/j.cnsns.2013.10.014
- Al-Dmour, Hayat, and Ahmed Al-Ani. "Quality optimized medical image information hiding algorithm that employs edge detection and data coding."Computer Methods and Programs in Biomedicine 127 (2016): 24- 43. https://doi.org/10.1016/j.cmpb.2016.01.011
- Westfeld A, Pfitzmann A. Attacks on steganographic systems. In: Third international workshop on information hiding, IH '99. London, UK: Springer; 2000. p. 61-76.
- Provos N, Honeyman P. Detecting steganographic content on the internet. In: NDSS'02: network and distributed system security symposium. Internet Society; 2002.