References
[1]. Abraham, A., & Paprzycki, M. (2004, April).
Significance of steganography on data security. In
International Conference on Information Technology:
Coding and Computing, 2004. Proceedings. ITCC 2004.
(Vol. 2, pp. 347-351). IEEE. https://doi.org/10.1109/ITCC.
2004.1286660
[2]. Anderson, R. J., & Petitcolas, F. A. (1998). On the limits of
steganography. IEEE Journal on Selected Areas in
Communications, 16(4), 474-481. https://doi.org/10.1109/
49.668971
[3]. Gupta, S., Gujral, G., & Aggarwal, N. (2012). Enhanced least significant bit algorithm for image
steganography. IJCEM International Journal of
Computational Engineering & Management, 15(4), 40-42.
[4]. Hordri, N. F., Yuhaniz, S. S., & Shamsuddin, S. M. (2016).
Deep learning and its applications: A review. In
Conference on Postgraduate Annual Research on
Informatics Seminar, (pp.1-6).
[5]. Johnson, N. F., & Jajodia, S. (1998). Exploring
steganography: Seeing the unseen. Computer, 31(2), 26-
34. https://doi.org/10.1109/MC.1998.4655281
[6]. Johnson, N. F., & Jajodia, S. (1998, April). Steganalysis
of images created using current steganography software.
In International Workshop on Information Hiding (pp. 273-
289). Springer, Berlin, Heidelberg. https://doi.org/10.1007/
3-540-49380-8_19
[7]. Krenn, R. (2004). Steganography and steganalysis. Leiden Institute of Advanced Computing Science, (pp.1-9).
[8]. Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An
overview of image steganography. In International Sports
Sciences Association, 1(2), 1-11.
[9]. Shi, H., Zhang, X. Y., Wang, S., Fu, G., & Tang, J. (2019,
June). Synchronized detection and recover y of
steganographic messages with adversarial learning. In
International Conference on Computational Science (pp.
31-43). Springer, Cham. https://doi.org/10.1007/978-3-
030-22741-8_3
[10]. Steganography. (n.d.). In Wikipedia. Retrieved from
https://en.wikipedia.org/wiki/Steganography
[11]. Wang, H., & Wang, S. (2004). Cyber warfare:
steganography vs. steganalysis. Communications of the
ACM, 47(10), 76-82. https://doi.org/10.1145/1022594.102
2597