References
- Y. Feng, J. Li, F. Han, and T. Ahmad, "A novel image encryption method based on invertible 3D maps and its security analysis," in Proceedings of 37th Annual Conference on IEEE Industrial Electronics Society (IECON), Melbourne, Australia, 2011, pp. 2186-2191.
- T. Ahmad, J. Hu, and S. Han, "An efficient mobile voting system security scheme based on elliptic curve cryptography," in Proceedings of 3rd International Conference on Network and System Security (NSS), Gold Coast, Australia, 2009, pp. 474-479.
- M. Holil and T. Ahmad, "Secret data hiding by optimizing general smoothness difference expansion-based method," Journal of Theoretical and Applied Information Technology, vol. 72, no. 2, pp. 155-163, 2015.
- W. C. Kuo, C. C. Wang, and Y. C. Huang, "Binary power data hiding scheme," AEU-International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1574-1581, 2015. https://doi.org/10.1016/j.aeue.2015.07.007
- M. H. A. Al-Huti, T. Ahmad, and S. Djanali, "Increasing the capacity of the secret data using DE pixels blocks and adjusted RDE-based on grayscale images," in Proceedings of 2015 International Conference on Information & Communication Technology and System (ICTS), Surabaya, Indonesia, 2015, pp. 225-230.
- T. S. Nguyen and C. C. Chang, "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, 2015. https://doi.org/10.1016/j.displa.2015.10.003
- A. M. Bagade and S. N. Talbar, "A high quality steganographic method using morphing," Journal of Information Processing Systems, vol. 10, no. 2, pp. 256-270, 2014. https://doi.org/10.3745/JIPS.03.0005
- R. M. Rad, K. Wong, and J. M. Guo, "A unified data embedding and scrambling method," IEEE Transactions on Image Processing, vol. 23, no. 4, pp. 1463-1475, 2014. https://doi.org/10.1109/TIP.2014.2302681
- V. K. Yadav and S. Batham, "A novel approach of bulk data hiding using text steganography," Procedia Computer Science, vol. 57, pp. 1401-1410, 2015. https://doi.org/10.1016/j.procs.2015.07.457
- D. Yan, R. Wang, X. Yu, and J. Zhu, "Steganography for MP3 audio by exploiting the rule of window switching," Computers & Security, vol. 31, no. 5, pp. 704-716, 2012. https://doi.org/10.1016/j.cose.2012.04.006
- S. Hemalatha, U. D. Acharya, and A. Renuka, "Wavelet transform based steganography technique to hide audio signals in image," Procedia Computer Science, vol. 47, pp. 272-281, 2015. https://doi.org/10.1016/j.procs.2015.03.207
- B. Saha and S. Sharma, "Steganographic techniques of data hiding using digital images," Defence Science Journal, vol. 62, no. 1, pp. 11-18, 2012. https://doi.org/10.14429/dsj.62.1436
- F. Djebbar, B. Ayad, K. A. Meraim, and H. Hamam, "Comparative study of digital audio steganography techniques," EURASIP Journal on Audio, Speech, and Music Processing, vol. 2012, pp. 1-16, 2012. https://doi.org/10.1186/1687-4722-2012-1
- V. Nagaraj, V. Vijayalakshmi, and G. Zayaraz, "Color image steganography based on pixel value modification method using modulus Function," IERI Procedia, vol. 4, pp. 17-24, 2013. https://doi.org/10.1016/j.ieri.2013.11.004
- C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
- N. Maleki, M. Jalali, and M. V. Jahan, "Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function," Egyptian Informatics Journal, vol. 15, no. 2, pp. 115-127, 2014. https://doi.org/10.1016/j.eij.2014.06.001
- K. H. Jung and K. Y. Yoo, "Improved exploiting modification direction method by modulus operation," International Journal of Signal Processing, Image Processing and Pattern, vol. 2, no. 1, pp. 79-87, 2009.
- S. Y. Shen and L. H. Huang, "A data hiding scheme using pixel value differencing and improving exploiting modification directions," Computers & Security, vol. 48, pp. 131-141, 2015. https://doi.org/10.1016/j.cose.2014.07.008
- W. Zhao, Z. Jie, L. Xin, and W. Qiaoyan, "Data embedding based on pixel value differencing and modulus function using indeterminate equation," Journal of China Universities of Posts and Telecommunications, vol. 22, no. 1, pp. 95-100, 2015. https://doi.org/10.1016/S1005-8885(15)60631-8
- K. C. Choi, C. M. Pun, and C. P. Chen, "Application of a generalized difference expansion based reversible audio data hiding algorithm," Multimedia Tools and Applications, vol. 74, no. 6, pp. 1961-1982, 2015. https://doi.org/10.1007/s11042-013-1732-1
- Animal.wav files [Online]. Available: http://www.externalharddrive.com/waves/animal/index.html.
- G. Kasana, K. Singh, and S. S. Bhatia, "Data hiding algorithm for images using discrete wavelet transform and Arnold transform," Journal of Information Processing Systems, 2015. http://dx.doi.org/10.3745/JIPS.03.0042.
- L. Sheugh and S. H. Alizadeh, "A note on pearson correlation coefficient as a metric of similarity in recommender system," in Proceedings of 5th Conference on Artificial Intelligence and Robotics (AI & Robotics), Qazvin, Iran, 2015, pp. 1-6.