References
[1]. Richard, B., and Alemayehu, M. (2006). Developing
E-banking Capabilities in a Ghanaian Bank: Preliminary
Lessons. Journal of Internet Banking and Commerce,
August 2006, Vol. 11, No.2.
[2]. Weiqi Luo; Fangjun Huang; Jiwu Huang; (2010). "Edge
Adaptive Image Steganography Based on LSB Matching
Revisited,"Information Forensics and Security, IEEE
Transactions on ,Vol.5, No.2, pp.201-214, June.
[3]. G. Sahoo, R. K. Tiwari, (2008). “Designing an
Embedded Algorithm for Data Hiding using
Steganographic Technique by File ybridization”, IJCSNS,
Vol. 8, No. 1, pp. 228-233, January.
[4]. Chander Kant, Ranjender Nath & Sheetal
Chaudhary,” Biometrics Securityusingsteganography”,
International Journal of Security, Volume (2): Issue (1) pp.1-5.
[5]. Mohit Soni, Sandesh Gupta, M.S. Rao, Phalguni
Gupta. (2010). A New Vein Pattern-based verification
System”, International Journal of Computer Science and
Information Security, Vol.8, No. 1, pp.58-63,
[6]. Maleika Heenaye-Mamode Khan, Naushad
Mamode Khan and Raja K. Subramanian,” (2010).
Feature Extraction of Dorsal Hand Vein Pattern using a fast
modified PCA algorithm based on Cholesky
decomposition and Lanczos technique”, World
Academy of Science, Engineering and Technology, vol.
61,pp.279-282,
[7]. Dr. M. Umamaheswari, S. Sivasubramanian, & S.
Pandiarajan, (2010).” Analysis of Different
Steganographic Algorithms for Secured Data Hiding”
,IJCSNS International Journal of Computer Science and
Network Security, Vol.10 No.8,August , pp.154-160.
[8]. J. Fridrich and M. Goljan, (2002). “Practical
steganalysis of digital images—State of the art,” in Proc.
SPIE Security Watermarking Multimedia Contents, vol.
4675, E. J. Delp III and P. W. Wong, Eds., , pp. 1–13.
[9]. Westfeld and A. Pfitzmann, (2000). “Attacks on
Steganographic Systems,”Lecture Notes in Computer
Science, vol.1768, Springer-Verlag, Berlin, pp. 61–75.
[10]. A. Ker, (2005). “Steganalysis of LSB Matching in
Grayscale Images.” IEEE Signal Processing Letters, Vol.
12(6), pp. 441–444,
[11]. J. Mielikainen, (2006). “LSB Matching Revisited,” IEEE
Signal Processing Letters, Vol. 13, NO. 5., MAY.
[12]. Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani, (2006). “Data Embedding Based on Better Use of
Bits in Image Pixels”, International Journal of Signal
Processing 2;2 © www.waset.org Spring.
[13]. Hung-Min Sun, Yao-Hsin Chen, and King-Hang
Wang, (2006). “An Image Data Hiding Scheme being
Perfectly Imperceptible to Histogram Attacks,” Image and
Vision Computing New Zealand IVCNZ 2006, November
27- 29.
[14]. D.C. Wu and W. H. Tsai, (2003). A steganographic
method for images by pixel-value differencing," Pattern
Recognition Letters, vol. 24, no. 9-10,pp. 1613-1626,.
[15]. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng
Wang, Member, IEEE, and Hung-Min Sun, (2008).
“Adaptive Data Hiding in Edge Areas of Images with
Spatial LSB Domain Systems”, IEEE Transactions on
Information Forensics and Security, VOL. 3, NO. 3,
September pp. 488-497.
[16]. Lin, E.T., and Delp, E.J. (1999). “A Review of Data
Hiding in Digital Images”. Retrieved on 1.Dec.2006 from
Computer Forensics, Cyber crime and Steganography
Resources, Digital Watermarking Links and Whitepapers,
Apr.
[17]. Petitcolas, F.A.P. “Introduction to Information Hiding”.
In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000).
Information hiding Techniques for Steganography and
Digital Watermarking. Norwood: Artech House, INC. Po-
Yueh Chen and Hung-Ju Lin “A DWT Based Approach for
Image steganography”, International Journal of Applied
Science and Engineering, 2006. 4, 3: 275-290