References
- K. Choudhary, "Image Steganography and Global Terrorism," International Journal of Scientific and Engineering Research, vol. 3, no. 7, 2012.
- Seok-ki Lee's RO, Secret communication using 'steganography' [Internet]. Available: https://news.chosun.com/site/data/html_dir/2013/09/11/2013091100144.html.
- BBC. Winter Olympics targeted by hackers says security firm [Internet]. Available: https://www.bbc.com/news/business-42600250.
- H. Mathkour, B. Al-Sadoon, and A. Touir, "A New Image Steganography Technique," 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008.
- J. H. He, W. Lan, and S. Tang, "A secure image sharing scheme with high quality stego-images based on steganography," Multimedia Tools & Applications, vol. 76, no. 6, pp. 7677-7698, Mar. 2017. https://doi.org/10.1007/s11042-016-3429-8
- B. Dunbar, "A Detailed Look at Steganographic Techniques and Their Use in an Open-systems Environment," SANS Institute, 2002.
- N. Subramanian, S. Al-maadeed, and A. Bouridane, "Image Steganography: A Review of the Recent Advances," IEEE, vol. 9, pp. 23409-23423, 2021.
- A. Majumder and S. Changder, "A Generalized Model of Text Steganography by Summary Generation using Frequency Analysis," IEEE, 7the International Conference on Reliabillity, Infocom Technologies and Optimization, pp. 599-605, 2018.
- A. A. AlSabnany, A. H. Ali, F. Ridzuan, A. H. Azni, and M. R. Mokhtar, "Digital Audio Steganography: Systematic Review, Classification, and Analysis of the Current State of the Art," In Computer Science Review, vol. 38, Nov. 2020.
- P. Hayati, V. Potdar, and E. Chang, "A Survey of Steganographic and Steganalytic Tools for the Digital Forensic Investigator," Workshop of Information Hiding and Digital Watermarking, 2007.
- A. Zeki, A. Ibrahim, and A. Manaf, "Steganographic Software: Analysis and Implementation," International Journal of Computers and Communications, vol. 6, no. 1, pp. 35-42, 2012.
- H. S. Ju and S. J. Kim, "Development Status of Encryption Products," The Korea Institute of Information Security and Cryptology, vol. 12, no. 5, pp. 50-61, 2002.
- Y. G. Go, K. R. Lee, and K. B. Yim, "Effective Detection and Extraction Methods of Hidden Data from Stego Image: Based on PNG File on StegoMagic," Spring Conference of KISM & SEBS, pp. 176-179, 2019.
- S. M. Kunjir, S. D. Patil, S. Jabeen, and S. V. Bhosale, "Review on Steganography Tools," International Research Journal of Engineering and Technology, vol. 3, no. 10, pp. 1223-1225, 2016.
- I. Karadogan and R. Das, "An Examination on Information Hiding Tools for Steganography," International Journal of Information Security Science, vol. 3, no. 3, pp. 200-208, 2014.
- U. Sara, M. Akter, and M. S. Uddin, "Image Quality Assessment through FSIM, SSIM, MSE and PSNR-A Comparative Study," Journal of Computer and Communication, vol. 7, no. 3, pp. 8-18, 2019. https://doi.org/10.4236/jcc.2019.73002
- Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image Quality Assessment: From Error Visibility to Structural Similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. https://doi.org/10.1109/TIP.2003.819861
- D. Setiadi, "PSNR vs SSIM: imperceptibility quality assessment for image steganography," Multimedia Tools and Applications 80, pp. 8423-8444, Nov. 2020. https://doi.org/10.1007/s11042-020-10035-z
- National Instruments Corporation. Peak Signal-to-Noise Ratio as an Image Quality Metric [Internet]. Available: https://www.ni.com/ko-kr/innovations/white-papers/11/peak-signal-to-noise-ratio-as-an-image-quality-metric.html.
- B. Kapila and T. Thind, "Review and Analysis of Data Security Using Image Steganography," IEEE, 2nd International Conference on Computation, Automation and Knowledge Management, Amity University, pp. 227-231, Jan. 2021.
- N. Koren. "The Imatest program: Comparing cameras with different amount of sharpening," In Digital Photography II, International Society for Optics and Photonics: San Francisco, CA, USA, vol. 6069, no. 60690L, 2006.