References
- M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, and M. Z. I. Shamsuddin, "Information hiding using steganography," in Proceedings of 4th National Conference on Telecommunication Technology (NCTT2003), Shah Alam, Malaysia, pp. 21-25, 2003.
- N. F. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, vol. 31, no. 2, pp. 26-34, 1998. https://doi.org/10.1109/MC.1998.4655281
- L. Wang, J. Wu, L. Jiao, L. Zhang, and G. Shi, "Lossy to lossless image compression based on reversible integer DCT," in Proceedings of 15th IEEE International Conference on Image Processing (ICIP2008), San Diego, CA, pp. 1037-1040, 2008.
- S. Owais, A. Zaidi, T. A. Khan, S. S. Hussain, and M. Hashmani, "A trend in global steganography and steganalysis approaches," Asian Journal of Engineering, Sciences & Technology, vol. 4, no. 1, pp. 30-33, 2014.
- G. Blanchet and M. Charbit, Digital Signal and Image Processing using MATLAB, 1st ed. New York, NY: Wiley, 2006.
- R. Chandramouli, M. Kharrazi, and N. Memon, "Image steganography and steganalysis: concepts and practice," in Digital Watermarking. Heidelberg: Springer, pp. 35-49, 2003.
- M. S. Al Rababaa, "Colored image-in-image hiding," in Proceedings of the 10th International Conference (CADSM2009): The Experience of Designing and Application of CAD Systems Microelectronics, Lviv-Polyana, Ukraine, pp. 445-450, 2009.
- W. C. Chu, "DCT-based image watermarking using subsampling," IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 34-38, 2003. https://doi.org/10.1109/TMM.2003.808816
- M. S. Nixon and A. S. Aguado, Feature Extraction & Image Processing for Computer Vision, 3rd ed. London: Academic Press, 2012.
- Y. Yang, P. Yuhua, and L. Zhaoguang, "A fast algorithm for YCbCr to RGB conversion," IEEE Transactions on Consumer Electronics, vol. 53, no. 4, pp. 1490-1493, 2007. https://doi.org/10.1109/TCE.2007.4429242
- T. Risset, "SoC (System on Chip)," in Encyclopedia of Parallel Computing. Boston, MA: Springer, pp. 1837-1842, 2011.
- S. Mahmoudpour and S. Mirzakuchaki, "Hardware architecture for a message hiding algorithm with novel randomizers," International Journal of Computer Applications, vol. 37, no. 7, pp. 46-53, 2012. https://doi.org/10.5120/4623-6632
- J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," IEEE Multimedia, vol. 8, no. 4, pp. 22-28, 2001. https://doi.org/10.1109/93.959097