1 |
H. S. Manjunatha Reddy and K. B. Raja, "High capacity and security steganography using Discrete Wavelet Transform," International Journal of Computer Science and Security, vol. 3, no. 6, pp. 462-472, 2010.
|
2 |
L. Siwei and H. Farid, "Steganalysis using higher-order image statistics," IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111-119, 2006.
DOI
ScienceOn
|
3 |
H. Sajedi and M. Jamzad, "Secure steganography based on embedding capacity," International Journal of Information Security, vol. 8, no. 6, pp. 433-445, 2009.
DOI
|
4 |
R. Shreelekshmi, M. Wilscy, and C. E. V. Madhavan, "Cover image preprocessing for more reliable LSB replacement steganography," in Proceedings of the International Conference on Signal Acquisition and Processing, Bangalore, India, 2010, pp. 153-156.
|
5 |
R. Z. Wang and Y. S. Chen, "High-payload image steganography using two-way block matching," IEEE Signal Processing Letters, vol. 13, no. 3, pp. 161-164, 2006.
DOI
ScienceOn
|
6 |
M. W. Chao, C. H. Lin, C. W. Yu, and T. Y. Lee, "A high capacity 3D steganography algorithm," IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 2, pp. 274-84, 2009.
DOI
ScienceOn
|
7 |
I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE Transactions on Image Processing, vol. 12, no. 2, pp. 221-229, 2003.
DOI
ScienceOn
|
8 |
M. Kharrazi, H. T. Sencar, and N. D. Memon, "Performance study of common image steganography and steganalysis techniques," Journal of Electronic Imaging, vol. 15, no. 4, pp. 041104, 2006.
DOI
ScienceOn
|
9 |
The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
|
10 |
S. F. Mare, M. Vladutiu, and L. Prodan, "Decreasing change impact using smart LSB pixel mapping and data rearrangement," in Proceedings of the IEEE 11th International Conference on Computer and Information Technology, Pafos, Cyprus, 2011, pp. 269-276.
|
11 |
E. Walia, P. Jain, and Navdeep, "An analysis of LSB & DCT based steganography," Global Journal of Computer Science and Technology, vol. 10, no. 1, pp. 4-8, 2010.
|
12 |
C. H. Hsieh and Q. Zhao, "Image enhancement and image hiding based on linear image fusion," in Image Fusion [Online], O. Ukimura, Ed. Intech, 2011, Chapter 2. Available: http://dx.doi.org/10.5772/14331
DOI
|
13 |
L. Yu, Y. Zhao, R. Ni, and T. Li, "Improved adaptive LSB steganography based on chaos and genetic algorithm," EURASIP Journal on Advances in Signal Processing, vol. 2010, no. 1, pp. 876946, 2010.
DOI
ScienceOn
|
14 |
H. B. Kekre, A. Athawale, and P. N. Halarnkar, "Increased capacity of information hiding in LSB's method for text and image," World Academy of Science, Engineering and Technology, vol. 2, no. 5, pp. 657-660, 2008.
|
15 |
A. Yadollahpour and H. M. Naimi, "Attack on LSB steganography in color and grayscale images. using autocorrelation coefficients," European Journal of Scientific Research, vol. 31, no. 2, pp. 172-183, 2009.
|
16 |
M. Kharrazi, H. Sencar, and N. Memon, "Improving steganalysis by fusion techniques: a case study with image steganography," in Transactions on Data Hiding and Multimedia Security I (Lecture Notes in Computer Science Vol. 4300), Y. Shi, Ed. Heidelberg, Germany: Springer Berlin, 2006, pp. 123-137.
|
17 |
N. N. EL-Emam, "Hiding a large amount of data with high security using steganography algorithm," Journal of Computer Science, vol. 3, no. 4, pp. 223-232, 2007.
DOI
|
18 |
C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, "A high quality steganographic method with pixel-value differencing and modulus function," Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008.
DOI
ScienceOn
|
19 |
A. Nissar and A. H. Mir, "Classification of steganalysis techniques: a study," Digital Signal Processing, vol. 20, no. 6, pp. 1758-1770, 2010.
DOI
ScienceOn
|
20 |
R. Amirtharajan, R. Akila, and P. Deepikachowdavarapu, "A comparative analysis of image steganography," International Journal of Computer Applications, vol. 2, no. 3, pp. 41-47, 2010.
DOI
|
21 |
W. Ying and P. Moulin, "Perfectly secure steganography: capacity, error exponents, and code constructions," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2706-2722, 2008.
DOI
ScienceOn
|
22 |
S. Narayana and G. Prasad, "Two new approaches for secured image steganography using cryptographic techniques and type conversions," Signal & Image Processing, vol. 1, no. 2, pp. 60-73, 2010.
|
23 |
P. A. Regalia, "Cryptographic secrecy of steganographic matrix embedding," IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, pp. 786-791, 2008.
DOI
ScienceOn
|
24 |
M. Mohamed, F. Al-Afari, and M. Bamatraf, "Data hiding by LSB substitution using genetic optimal key-permutation," International Arab Journal of e-Technology, vol. 2, no. 1, pp. 11-17, 2011.
|
25 |
X. Liao, Q. Y. Wen, and J. Zhang, "A steganographic method for digital images with four-pixel differencing and modified LSB substitution," Journal of Visual Communication and Image Representation, vol. 22, no. 1, pp. 1-8, 2011.
DOI
ScienceOn
|
26 |
C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
DOI
ScienceOn
|
27 |
R. Z. Wang, C. F. Lin, and J. C. Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition, vol. 34, no. 3, pp. 671-683, 2001.
DOI
ScienceOn
|
28 |
C. C. Chang, J. Y. Hsiao, and C. S. Chan, "Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy," Pattern Recognition, vol. 36, no. 7, pp. 1583-1595, 2003.
DOI
ScienceOn
|
29 |
K. C. Chang, C. P. Chang, P. S. Huang, and T. M. Tua, "A novel image steganographic method using tri-way pixel-value differencing," Journal of Multimedia, vol. 3, no. 2, pp. 37-44, 2008.
|
30 |
Z. Xinpeng, "Efficient data hiding with plus-minus one or two," IEEE Signal Processing Letters, vol. 17, no. 7, pp. 635-638, 2010.
DOI
ScienceOn
|
31 |
G. Swain and S. Lenka, "LSB array based image steganography technique by exploring the four least significant bits," in Global Trends in Information Systems and Software Applications (Communications in Computer and Information Science Vol. 270), P. V. Krishna, M. R. Babu, and E. Ariwa, Eds. Heidelberg, Germany: Springer Berlin, 2012, pp. 479-488.
|
32 |
C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, 2008.
DOI
ScienceOn
|
33 |
T. Kanai, H. Suzuki, and F. Kimura, "Metamorphosis of arbitrary triangular meshes," IEEE Computer Graphics and Applications, vol. 20, no. 2, pp. 62-75, 2000.
|
34 |
H. Nakamura and Z. Qiangfu, "Information hiding based on image morphing," in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, Okinawa, Japan, 2008, pp. 1585-1590.
|
35 |
S. Kondo and Q. Zhao, "A novel steganographic technique based on image morphing," in Ubiquitous Intelligence and Computing: Proceedings of the Third International Conference, Wuhan, China, September 3-6, 2006 (Lecture Notes in Computer Science Vol. 4159), J. Ma, H. Jin, L. Yang, and J. P. Tsai, Eds. Heidelberg, Germany: Springer Berlin, 2006, pp. 806-815.
|
36 |
A. M. Bagade and S. N. Talbar, "Image morphing concept for secure transmission of image data contents over internet," Journal of Computer Science, vol. 6, no. 9, pp. 987-992, 2010.
DOI
|
37 |
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Information Hiding: Third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 Proceedings (Lecture Notes in Computer Science Vol. 1768), A. Pfitzmann, Ed. Heidelberg, Germany: Springer Berlin, 2000, pp. 61-76.
|