1 |
A. Ker (June, 2005), "Steganalysis of LSB Matching in Gray scale Images", IEEE Signal Processing Letter, vol. 12, no.6, pp. 441-444.
DOI
ScienceOn
|
2 |
A. Ker, (May 23-25, 2004), "Improved Detection of LSB Steganography in Grayscale Images". In Proc. 6th International Workshop. Toronto (Canada), Springer LNCS, vol. 3200, p. 97-115.
|
3 |
Adnan Gutub, Ayed Al-Qahtani, AbdulazizTabakh (May 10-13, 2009), "Triple-A: Secure RGB Image Steganography Based on Randomization" Proceedings of IEEE/ACS International Conference on Computer Systems and Applications (AICCSA, 2009), Rabat, Morocco. pp.400-403.
|
4 |
Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, AbdulrahmanShaheen, and AleemAlvi (18-20 March, 2008), "Pixel Indicator high capacity Technique for RGB image Based Steganography", Proceedings of 5th IEEE International Workshop on Signal Processing and its Applications (WoSPA 2008), University of Sharjah, Sharjah, U.A.E.
|
5 |
Ali Shariq Imran, M. YounusJaved, and NaveedSarfrazKhattak (2007) "A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information", World Academy of Science, Engineering and Technology 31 2007.
|
6 |
Arjun, N Santosh.; AtulNegi, (14-17 Nov. 2006), "A Filtering Based Approach to Adaptive Steganography," TENCON 2006, IEEE Region 10 Conference, vol., no., pp.1-4.
|
7 |
AroojNissar, A. H. Mir, (Decemeber, 2010), "Classification of Steganalysis Techniques: A Study", Digital Signal Processing, Elsevier, Vol.20, No.6, pp.1758-1770.
DOI
ScienceOn
|
8 |
J. F. Canny, (1986), "A Computational Approach to Edge Detection". IEEE Trans. Pattern Anal. Machine Intell., Vol. PAMI-8, No. 6, pp. 679-697.
DOI
ScienceOn
|
9 |
J. K. Mandal and Debashis Das (July, 2012), "Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain" International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.4.
|
10 |
J.K.Mandal, A. Khamrui, (2011), "A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)", Electronic System Design (ISED), International Symposium, pp: 347-351.
|
11 |
Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE Signal Processing Letters, Vol. 13, no. 5, p. 285-287.
DOI
ScienceOn
|
12 |
Jen-Chang Liu, Ming-Hong Shih (2008), "Generalizations of Pixel Value Differencing Steganography For Data Hiding In Images", FundamentaInformaticae, Vol. 83, No. 3, pp. 319-335.
|
13 |
Jessica Fridrich, MiroslavGoljan, and Rui Du. (2001), "Reliable Detection of LSB Steganography in Color and Grayscale Images". In Proceedings of 2001 ACM workshop on Multimedia and Security: New Challenges, pp 27-30. ACM Press, 2001.
|
14 |
Juan Jose Roque and JesusMariaMinguet (2009), "SLSB: Improving the Steganographic Algorithm LSB", 7th International Workshop on Security in Information Systems, 57-66, (2009).
|
15 |
Kathryn Hempstalk, (11-19 February 2006), "Hiding Behind Corners: Using Edges in Images for Better Steganography", Proceedings of the Computing Women's Congress, Hamilton, New Zealand.
|
16 |
Ki-Hyun Jung, Kyeoung-Ju Ha, Kee-Young Yoo (Aug 28-30, 2008), "Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods.", In Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08). Daejeon (Korea), pp. 355-358.
|
17 |
X. Liao, Q.-Y. Wen, and J. Zhang (2011), "A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8.
DOI
ScienceOn
|
18 |
W. Luo, F. Huang and J. Huang (2010), "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp.201-214.
DOI
ScienceOn
|
19 |
Wen-Nung Lie, Li-Chun Chang (October 24-28, 1999), "Data hiding in images with adaptive numbers of least significant bits based on the human visual system." In Proc. IEEE Int. Conf., Image Processing. Kobe (Japan), pp 286-290.
|
20 |
Westfeld and A. Pitzmann (1999), "Attacks on Steganographic Systems - Breaking the Steganographic Utilities Ezstego, Jsteg, Steganos, and S-tools-and Some Lessons Learned", In Proceedings of the 3rd Information Hiding Workshop, volume 1768 of LNCS, pages 61-76. Springer, 1999.
|
21 |
X. Zhang, S. Wang, (2004): Vulnerability of Pixel Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, vol.25, pp. 331-339.
DOI
ScienceOn
|
22 |
Xiaolong Li, Bin Yang, Daofang Cheng, TieyongZeng (2009), "A Generalization of LSB Matching". IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72.
DOI
ScienceOn
|
23 |
Y. K. Lee, L. H. Chen, (2000), "High Capacity Image Steganographic Model", IEEE Proc., Vis. Image Signal Process, Vol. 147, no. 3, p. 288-294.
|
24 |
Y. R. Park, H. H. Kang, S. U. Shin, K. R. Kwon, (2005), "A Steganographic Scheme in Digital Images Using Information of Neighboring Pixels.", In Proc. International Conference on Natural Computation. Berlin (Germany), Springer-Verlag LNCS, Vol. 3612, pp. 962-968.
|
25 |
Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun (2008), "Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems". IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, pp. 488-497.
DOI
ScienceOn
|
26 |
Bin Li, JunhuiHe,JiwuHuang,Yun Qing Shi (April, 2011), "A Survey on Image Steganography and Steganalysis", Journal of Information Hiding and Multimedia Signal Processing Volume 2, Number 2.
|
27 |
C. C. Thien, J. C. Lin, (2003), "A Simple and High-Hiding Capacity Method for Hiding Digit-By-Digit Data in Images Based On Modulus Function". Pattern Recognition, vol. 36, p. 2875-2881.
DOI
ScienceOn
|
28 |
C. H. Yang, C. Y. Weng, (December, 2006), "A Steganographic Method for Digital Images by Multi-Pixel Differencing." In Proc. International Computer Symposium. Taipei (Taiwan), pp. 831 to 836.
|
29 |
Chi-Kwong Chan, L. M. Cheng, (2001), "Improved Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement", IEE Eelectronics letters, vol. 37, no. 16, p. 1017-1018.
DOI
ScienceOn
|
30 |
Chi-Kwong Chan, L. M. Cheng, (2004), "Hiding data in images by simple LSB substitution. Pattern Recognition", Vol. 37, p. 469-474.
DOI
ScienceOn
|
31 |
Chin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan (2006), "Image Hiding Scheme with Modulus Function and Dynamic Programming Strategy on Partitioned Pixels." Pattern Recognition, vol. 39, no. 6, p. 1155-1167.
DOI
ScienceOn
|
32 |
Chin-Chen Chang, Ju-Yuan Hsiao, Chi-Shiang Chan (2003), "Finding Optimal Least-Significant-Bit Substitution in Image Hiding By Dynamic Programming Strategy". Pattern Recognition, Vol. 36, p.1538-1595.
|
33 |
Chin-Chen Chang, Min-Hui Lin, Yu-Chen Hu (2002), "A Fast And Secure Image Hiding Scheme Based on LSB Substitution", International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, p. 399-416.
DOI
ScienceOn
|
34 |
Markus Kahn, (1995), Steganography Mailing List, 5 July.
|
35 |
M. Hussain, M. Hussain, (5-6 September, 2011), "Embedding data in edge boundaries with high PSNR", Proceedings of 7th International Conference on Emerging Technologies (ICET 2011), vol., no., pp.1-6.
|
36 |
M. Hussain, (2010), "Pixel Intensity Based High Capacity Data Embedding Method" International Conference on Information and Emerging Technologies (ICIET), pp.1-5.
|
37 |
Manglem Singh, Birendra Singh, ShyamSundar Singh (April, 2007), "Hiding Encrypted Message in the Features of Images", IJCSNS, VOL. 7, No.4.
|
38 |
Mohammad TanvirParvez and Adnan Gutub (9-12 December 2008), "RGB Intensity Based Variable-Bits Image Steganography", Proceedings of 3rd IEEE Asia-Pacific Services Computing Conference (APSCC 2008), Yilan, Taiwan.
|
39 |
Najme Maleki, MehrdadJalali, M. VafaeiJahan, (July, 2011), "An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function," International Conference on. Information Processing, Computer Vision, and Pattern Recognition (IPCV'11), Las Vegas, Nevada, USA.
|
40 |
Nanhay Singh, Bhoopesh Singh Bhati, R. S. Raw, (2012), "A Novel Digital Image Steganalysis Approach for Investigation. International Journal of Computer Applications", 6/1/2012, Vol. 47, pp18 .
|
41 |
Niel F. Johnson, ZoranDuric, SushilJajodia (2000), "Information Hiding, and Watermarking - Attacks & Countermeasures," Kluwer Academic Publishers.
|
42 |
Niels Ferguson and Bruce Schneier, (2003), Practical Cryptography, John Wiley.
|
43 |
Niels Provos and Peter Honeyman (2002), "Detecting Steganographic Content on The Internet". In Proceedings of NDSS'02: Network and Distributed System Security Symposium, pp1-13, Internet Society, 2002.
|
44 |
GandharbaSvvalin,Saroj Kumar Lenka (June, 2012), "A Novel Approach to RGB Channel Based Image Steganography Technique", International Arab Journal of e-Technology, Vol. 2, No. 4.
|
45 |
Chin-Chen Chang, Tseng, H.W. (2004), "A Steganographic Method for Digital Images Using Side Match.", Pattern Recognition Letters, Vol. 25, pp.1431-1437.
DOI
ScienceOn
|
46 |
Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang (2008), "A high quality steganographic method with pixel-value differencing and modulus function." Journal of Systems and Software, Vol. 81, No. 1, pp. 150-158.
DOI
ScienceOn
|
47 |
D.C. Wu, W. H. Tsai (2003), "A Steganographic Method for Images by Pixel-Value Differencing", Pattern Recognition Letter, Vol. 24, No. 9-10, p. 1613-1626.
DOI
ScienceOn
|
48 |
H. B. Kekre, ArchanaAthawale, Pallavi N. Halarnkar (2008), "Increased Capacity of Information Hiding In Lsb's Method For Text And Image" International Journal of Electrical, Computer, and Systems Engineering, Vol. 2, No. 4, p. 246-249.
|
49 |
H. B. Kekre, ArchanaAthawale, Pallavi N. Halarnkar, (2009) "Performance Evaluation Of Pixel Value Differencing And Kekre's Modified Algorithm For Information Hiding In Images", ACM International Conference on Advances in Computing, Communication and Control (ICAC3).
|
50 |
H.C. Wu, N.I. Wu, C.-S Tsai, M.S Hwang, (2005), "Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods", IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, No. 5, pp. 611-615.
|
51 |
J. C. Joo, T. W. Oh, H. Y. Lee, H. K. Lee (Jan, 2011), "Adaptive Steganographic Method Using the Floor Function with Practical Message Formats," International. Journal of Innovative Computing, Information and Control, Vol. 7, No. 1, pp. 161-175. ISSN 1349-4198.
|
52 |
R. H. Alwan., F. J. Kadhim, and A. T. Al-Taani, (2005), Data Embedding Based on Better Use of Bits in Image Pixels. International Journal of Signal Processing, 2 (1), 104-107.
|
53 |
P. Mohan Kumar, K. L. Shunmuganathan (2012), "Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate", Information Security Journal: A Global Perspective, Vol. 21, Issue 2.
|
54 |
P.V.C. Hough (1962), Method and Means for Recognizing Complex Patterns, U.S. Patent 3069654.
|
55 |
R. Amirtharajan, J. Qin and J.B.B. Rayappan (2012). "Random Image Steganography and Steganalysis: Present Status and Future Directions", Information Technology Journal, Vol 11, pp 566-576.
DOI
|
56 |
Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin (2000), "Hiding Data in Images by Optimal Moderately Significant Bit Replacement" IET Electronics Letters, vol. 36, no. 25, pp. 2069-2070.
DOI
ScienceOn
|
57 |
Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, (2001), "Image Hiding by Optimal LSB Substitution And Genetic Algorithm." Pattern Recognition, vol. 34, p. 671-683.
DOI
ScienceOn
|
58 |
Shao-Hui Liu, Tian-Hang Chen, Hong-Xun Yao, Wen Gao (Aug. 26-29, 2004), "A Variable Depth LSB Data Hiding Technique in Images". In Proc. 2004 International Conference on Machine Learning and Cybernetics. Shanghai (China), Vol. 7, p. 3990-3994.
|
59 |
Specification for the Advanced Encryption Standard (AES), (Nov. 2001), Federal Information Processing Standards Publication 197.
|
60 |
Stanley, C.A. (2005), "Pairs of Values and the Chi-squared Attack", in CiteSteer. 2005, pp. 1-45.
|
61 |
W. Chen, C. Chang, T. Le, (2010), "High Payload Steganography Mechanism Using Hybrid Edge Detector", Expert Systems with applications, vol. 37, pp 3292-3301.
DOI
ScienceOn
|
62 |
Yung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li (2008), "A Large Payload Data Embedding Technique for Color Images", FundamentaInformaticae, Volume 88, Number 1-2, pp47-61.
|
63 |
Youssef Bassil (December, 2012), "Image Steganography Based on a Parameterized Canny Edge Detection Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 60, No.4.
|