References
[1]. Gopalan, K., (2003). "Audio steganography using bit
modification", IEEE International Conference on
Acoustics, Speech and Signal Processing, Page(s): II - 421- 4 Vol.2.
[2]. Muhammad Asad, Junaid Gilani, Adnan Khalid
(2011). “An Enhanced Least Significant Bit Modification
Technique for Audio Steganography”, International
Conference on Computer Networks and Information
Technology (ICCNIT), pages 143-147.
[3]. Zamani, M., Manaf, A, Ahmad, R.B., Jaryani, F.,
Taherdoost, H., Zeki, AM., (2009). "A secure audio
steganography approach", International Conference for
Internet Technology and Secured Tmnsactions, Page(s): 1
-6.
[4]. Kaliappan Gopalan, (2009). "A Unified Audio and
Image Steganography by Spectrum Modification",
International Conference on Industrial Technology,
Page(s): 1 – 5
[5]. Raja K B, Chowdary C R, Venugopal K R, Patnaik L M
(2005). “A Secure Image Steganography using LSB, DCT
and Compression Techniques on Raw Images”IEEE
International Conference on Session B-image Signal
Processing.
[6]. Hossein Malekmohamadi and Shahrokh
Ghaemmaghami (2009). ”Reduced Complexity
Enhancement of Steganalysis Of LSB-Matching Image
Steganography” IEEE/ACS, International Conference on
Computer System and Applications.
[7]. Balagi R, Naveen G (2011). “Secure Data Transmission
Using Video Steganography ”, IEEE International
Conference on Electro/Information Technology (EIT).
[8]. Andrew D. Ker, (2007). “Steganalysis of Embedding in
Two Least-Significant Bits” IEEE Transactions on Information
Forensics and Security, Vol. 2, No. 1, march.
[9]. M.D. Swanson, M. Kobayashi, and A.H. Tewfik, (1998).
“multimedia data embedding and watermarking
technologies” Proc, IEEE Vol.86,pp. 1064-1087, June.
[10]. L.M. Marvel, C.G. Boncelet, Jr. and C.T. Retter,
(1999). “spread spectrum image steganography” IEEE
Trans Image Proc, Vol.8,pp. 1075-1083.
[11]. K. Gopalan, S. Wenndt and D. Haddad, (2007).
“ Steganographic method for covert audio
communications,” U.S. Patent 7 231 271, June 12.
[12]. Avcibas I., Memon N. and Sankur B. (2003).
“Steganalysis using image quality metrics”. IEEE
Transactions on Image Processing, Vol. 12, pp. 21- 229,
Feb.
[13]. Voloshynovskiy, S. V., et al., (2002). “StegoWall: Blind
Statistical Detection of Hidden Data,”, Proceedings of
Electronic Imaging 2002, Security and Watermarking of
Multimedia Contents IV, San Jose, CA, January , pp.
57–68.