1 |
I. Banerjee, S. Bhattacharyya and G. Sanyal, "A procedure of text steganography using Indian regional language", I. J. Computer Network and Information Security, Vol 8, pp. 65-73, 2012.
|
2 |
M. Nosrati and R. Karimi, "A survey on usage of genetic algorithms in recent steganography researches", World Applied Programming, Vol 2, No. 3, pp. 206-210, March 2012.
|
3 |
Y. Kaya, M. Uyar and R. Tekin, "A novel crossover operator for genetic algorithms: ring crossover", AWERProcedia Information Technology&Computer Science, Vol 1, pp. 1286-1292, 2012.
|
4 |
I. B. S. Bhattacharyya and G. Sanyal, "Design and implementation of a secure text based steganography model", In Proceedings of 9th annual Conference on Security and Management under The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing, LasVegas, USA, July 12-15, 2010.
|
5 |
T. Yalcinoz, H. Altun and M. Uzam, "Economic dispatch solution using a genetic algorithm based on arithmetic crossover", Proto Power Tech Conference 2001, 2001.
|
6 |
B. Osman, R. Din and M. R. Idrus, "Capacity performance of steganography method text based domain" ARPN Journal of Engineering and Applied Sciences, Vol 10, NO. 3, pp. 1345-1351, 2015.
|
7 |
S. S. Ji, "Advanced LSB technique for hiding messages in audio steganography", KIISC, Vol 17, No. 5, pp. 37-42, 2014.
|
8 |
C. K. Mulunda, P. W. Wagacha and L. O. Adede, "Genetic algorithm based model in text steganography", The African Journal of Information Systems, Vol 5, Issue 4, Article 2, pp. 131-144, 2013.
|
9 |
S. Bhattacharyya, I. Banerjee and G. Sanyal, "A novel approach of secure text based steganography model using word mapping method(WMM)", International Journal of Computer and Information Engineering Vol 4, No. 2, pp. 97-103, 2010.
|