1 |
S. Abed, M. Al-Mutairi, A. Al-Watyan, O. Al-Mutairi, W. Alenizy, and A. Al-Noori, "An Automated Security Approach of Video Steganography Based LSB Using FPGA Implementation," vol. 28, no. 5, 2019.
|
2 |
S. Venkatraman, A. Abraham, and M. Paprzycki, "Significance of steganography on data security," in Proc. of International Conference on Information Technology: Coding Computing, ITCC, 2004.
|
3 |
M. G.R and A. Danti, "A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography In Spatial Domain," Int. J. Secur. Priv. Trust Manag., vol. 4, no. 1, pp. 11-20, 2015.
DOI
|
4 |
R. Gupta, S. Gupta, and A. Singhal, "Importance and Techniques of Information Hiding : A Review," Int. J. Comput. Trends Technol., vol. 9, no. 5, 2014.
|
5 |
S. D. Hu and K. T. U, "A novel video steganography based on non-uniform rectangular partition," in Proc. of - 14th IEEE Int. Conf. on Computational Science and Engineering, CSE 2011 and 11th Int. Symp. on Pervasive Systems, Algorithms, and Networks, I-SPA 2011 and 10th IEEE Int. Conf. on IUCC 2011, 2011.
|
6 |
M. El-Bayoumy, M. El-Mogy, A. Abou El-Fetouh, and R. El-Hadary, "A Proposed Technique for Hiding Encrypted Data in Video Files," Int. J. Comput. Appl., vol. 79, no. 10, pp. 38-42, 2013.
DOI
|
7 |
K. B. Sudeepa, K. Raju, H. S. Ranjan Kumar, and G. Aithal, "A New Approach for Video Steganography Based on Randomization and Parallelization," Phys. Procedia, vol. 78, pp. 483-490, 2016.
|
8 |
R. Kaur and S. Kaur, "XOR-EDGE based Video Steganography and Testing against Chi-Square Steganalysis," Int. J. Image, Graph. Signal Process., vol. 8, no. 9, pp. 31-39, 2016.
DOI
|
9 |
S. Manisha and T. S. Sharmila, "A two-level secure data hiding algorithm for video steganography," Multidimens. Syst. Signal Process., vol. 30, pp. 529-542, 2019.
DOI
|
10 |
Z. Khan et al., "Threshold-based steganography: A novel technique for improved payload and SNR," The International Arab Journal of Information Technology, vol. 13, no. 4, pp. 380-386, 2016.
|
11 |
A. K. Pal, K. Naik, and R. Agarwal, "A Steganography Scheme on JPEG Compressed Cover Image with High Embedding Capacity," The International Arab Journal of Information Technology, vol. 16, no. 1, pp. 116-124, 2019.
|
12 |
S. Sun, "Image Steganography Based on Hamming Code and Edge Detection," The International Arab Journal of Information Technology, vol. 15, no. 5, pp. 875-881, 2018.
|
13 |
M. A. A. Pujari and M. S. S. Shinde, "Data Security using Cryptography and Steganography," IOSR J. Comput. Eng., vol. 18, no. 04, pp. 130-139, 2016.
DOI
|
14 |
M. Raggo and C. Hosmer, "Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices, and Network Protocols," 2012.
|
15 |
T. P. T. Gebreslassie, "Information Security Using Image Based Steganography," International Research Journal of Engineering and Technology (IRJET), Vol. 03, Issue 06, pp. 2839-2844, 2016.
|
16 |
S. Imaculate Rosaline and M. Ashok Raj, "Adaptive Pixel Pair Matching based Steganography for audio files," in Proc. of 2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT), pp. 1-5, 2013.
|
17 |
A. Sakthivel and R. Nedunchezhian, "Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing," The International Arab Journal of Information Technology, vol. 11, no. 4, pp. 322-328, 2014.
|
18 |
A. A. Maaita, and H. A. A. Al Sewadi, "Deterministic Random Number Generator Algorithm for Cryptosystem Keys," International Journal of Computer and Information Engineering, vol. 9, no. 4, pp. 972-977, 2015.
|
19 |
M. A. Alia, "Cryptosystems Based on Chaos Theory," Ercetin S., Banerjee S. (eds) Chaos, Complexity and Leadership 2013, Springer Proceedings in Complexity. Springer, Cham, pp. 129-145, 2015.
|
20 |
A. Nasreen and G. Shobha, "Key Frame Extraction from Videos - A Survey," International Journal of Computer Science and Computer Networks (IJCSCN), vol. 3, issue 3, pp..194-198, 2013.
|
21 |
N. State, "Fibonacci Random Number Generator using Lehmer's Algorithm," Mathematical Theory and Modeling, vol. 3, no. 14, pp. 56-63, 2013.
|
22 |
A. Mohammad, O. Saleh, and R. A. Abdeen, "Occurrences Algorithm for String Searching Based on Brute-force Algorithm," J. Comput. Sci., vol. 2, no. 1, pp. 82-85, 2006.
DOI
|
23 |
M. A. Alsarayreh, M. A. Alia, and K. A. Maria, "A Novel Image Steganographic System Based on Exact Matching Algorithm and Key-Dependent Data Technique," Journal of Theoretical and Applied Information Technology, vol. 95, no. 5, 2017.
|
24 |
E. Cole, "Hiding in Plain Sight: Steganography and the Art of Covert Communication," Wiley, 2003.
|