1 |
Susmita Soni and Sunita Chaudhary, "A Hybrid Approach of Steganography and Cryptography to improve Data Security", IJLTEMAS, Vol. 3, Issue 4, pp. 163-166, 2014.
|
2 |
R. Halder, S. Sengupta, S. Ghosh and D. Kundu, "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique", IOSR Journal of Computer Engineering, Vol. 18, Issue 1, pp. 39-43, 2016.
|
3 |
C. K. Chan and L. M. Cheng, "Hiding Data in Images by Simple LSB Substitution", Pattern Recognition, Vol. 37, No. 3, pp. 469-474, 2004.
DOI
|
4 |
A. G. Meshram and Rahul Patil, "Secure Secret Key Transfer Using Modified Hash Based LSB method", International Journal of Computer Science and Information Technologies, Vol. 5, No. 6, pp. 7683-7685, 2014.
|
5 |
A. Fatnassi, H. Gharsellaoui and S. Bouamama, "A New Hybrid Steganalysis Based Approach for Embedding Image in Audio and Image Cover Media", IFAC-PapersOnLine Vol. 49, No. 12, pp. 1809-1814, 2016.
DOI
|
6 |
V. Parihar, D. Gehlot and A. Choudhary, "A Steganography Implementation based on LSB & LDR Algorithm", 3rd Security and Privacy Symposium, 2015.
|
7 |
Y. Yu Wai and E. Ei Myat, "Comparison of LSB, MSB and New Hybrid(NHB) of Steganography in Digital Image", International Journal of Engineering Trends and Applications, Vol. 5, Issue 4, pp. 16-19, 2018.
|
8 |
H. G. Kim and B. M. Kang, "Frequency Analysis of Hangul Usage", Korea Cultural Research Center, Korea university, 1997.
|
9 |
G. Swain and S. K. Lenka, "Classification of Image Steganography Techniques in Spatial Domain: A Study", International Journal of Computer Science&Engineering Technology, Vol. 5, No. 3, pp. 219-232, 2014.
|