References
[1]. Petitcolas, Fabien A.P., and Stefan Katzenbeisser,
(2000). Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Boston, London.
[2]. Richard Pierre, (2003). Steganalysis: Detecting
Hidden Information with Computer Forensic Analysis.
SANS Institute Infosec Reading Room. Retrieved from
https://www.sans.org/reading-room/whitepapers/
stenganography/steganalysis-detecting-hiddeninformation-
computer-forensic-analysis-1014
[3]. Silverman Joseph, (2006). An Introduction to Theory of
Elliptic Curves. Summer School on Computational
Number Theory and Applications to Cryptography,
University of Wyoming. Retrieved from www.math.brown.
edu/~jhs/ Presentations/Wyoming EllipticCurve.pdf
[4]. Milne J.S., (2006). Elliptic Curves. BookSurge
Publishing. Retrieved from www.jmilne.org/math
/Books/ectext5.pdf
[5]. Murray, William, (2004). Microsoft Windows Bitmap
File Format Summary. Retrieved from http://www.file format.info/format/bmp/egff.htm
[6]. Mutoo, Kumar V., (2012). “Secure data hiding using
Eight Queens Solution”. International Journal of
Information Security and Privacy (IJISP), Vol. 6, No. 4.
Retrieved from http://www.igi-global.com/article/securedata-
hiding-using-eight/ 75322
[7]. Mayukh, (2015). Hiding Text in Image File: Image
Encryption in Matlab. Retrieved from http://www.
instructables.com/id/ Hide-data-in-an-Image-file-using-
Matlab/step0/Hide-data-in-an-Image-file-using-Matlab
[8]. Cherma Rajan A., (2007). Hiding Test in an Image.
Retrieved from https://in.mathworks.com/matlabcentral
/fileexchange/13698-hiding-multiple-text-pages-into-acolor-
image/content/html/main.html
[9]. Sakakura Tadakazu, and Hayashi Akira, (2010). “A
Simple Detection Scheme of LSB Steganography based
on Statistics of Image Difference Signal”. 2010
International Symposium on Information Theory and its
Application, IEEE, October 17 – 20, pp 320-325.
[10]. Johnson N.F. and Jajodia S., (1998). “Steganalysis of
Images Created using Current Steganography Software”.
Lecture Notes in Computer Science, Vol.1525, Springer-
Verlag, Berlin, pp. 273289.
[11]. Muttoo S.K., Kumar, V., (2012). “Watermarking Digital
Vector Map Using Graph Theoretic Approach”. Annals of
GIS, Taylor & Francis. Vol. 18, No. 2, pp. 135-146.
[12]. Kumar, V., and Muttoo S.K., (2011). “A Graph
Theoretic Approach to Sustainable Steganography”. MIS
Review: An Int. Journal, Vol. 17, No. 1, pp. 19-37.
[13]. Thiyagarajan P., Natarajan V., Aghilia G., Pranna
Venkatesan, and Anitha R., (2013). “Pattern based 3D
Image Steganography”. 3D Research, Vol. 4, No.1, pp. 1-8.
[14]. Juneja Mamta and Sandhu Parvinder, (2013). “A
New Approach for Information Security using and
Improved Steganography technique”. Journal of Info.
Pro. Systems, Vol. 9, No. 3, pp. 405-424.
[15]. Gupta Richa, and Singhal Anuradha, (2014).
“Importance and Techniques of Information hiding: A
Review”. 2014, International Journal of Computer Trends
and Technology (IJCTT), Vol. 9, No. 5, pp. 260-265.
[16]. Dunbar Bret, (2002). A Detailed look at
Steganographic Techniques and their use in an Open-
Systems Environment. SANS Institute Infosec Reading
Room