References
[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das, (2008). ”A Tutorial Review on Steganography ”, International conference 2008 at JIIT.
[2]. Ahsan, K. & Kundur, D., (2002). “Practical Data hiding in TCP/IP”, Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002.
[3]. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, (1999). "Information hiding-a survey," Proceedings of the IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.
[4]. J.C. Judge, (2001). "Steganography: Past, Present, Future," SANS white paper, 30 November, 2001, http://www.sans.org/rr/papers/index.php?id=552.
[5]. N.J. Hopper, (2004). Toward a theor y of Steganography, Ph.D. Dissertation, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA, July 2004.
[6]. M. Shirali-Shahreza, (2005). "An Improved Method for Steganography on Mobile Phone," WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). "Copyright Protection in Video Delivery Networks by Watermarking of Pre- Compressed Video," Proceedings of Multimedia Applications, Services and Techniques ECMAST '97', Springer Lecture Notes in Computer Science, Vol. 1242, Milan, Italy, May 1997, pp. 423-436.
[8]. M. Hassan Shirali-Shahreza, Mohammad Shirali- Shahreza, (2007). ” Sending Mobile Software Activation Code by SMS Using Steganography ”, Intelligent Information Hiding and Multimedia Signal Processing, 2007, IIHMSP 2007, Third International Conference on 2007, pp. 554-557
[9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, (2010). "Digital image steganography: Survey and analysis of current methods" 2010, Elsevier, Signal Processing , pp. 727-752
[10]. Mohammad Shirali Shahreza, (2006). ”Stealth Steganography in SMS”, IEEE Wireless and Optical Communications Networks, 2006 IFIP International Conference.
[11]. Mohammad Shirali-Shahreza, M. Hassan Shirali-Shahreza, (2007). “Text Steganography in SMS”, 2007 International Conference on Convergence Information Technology.
[12]. M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, (2008). “Steganography in SMS by Sudoku Puzzle”, Computer Systems and Applications, 2008. AICCSA 2008. IEEE/ACS International Conference , pp. 844-847
[13]. Khan Farhan Rafat, (2009). “Enhanced Text Steganography in SMS”, Computer, Control and Communication, 2009, IC4 2009, 2nd International Conference, pp. 1-6
[14]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996). “Techniques for data hiding”, IBM Systems Journal, vol. 35, Issue 3&4, 1996, pp. 313-336
[15]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy Rytsav., “Cryptography and Steganography of Video information in modern communication”, Electronics and Energetics, Vol 11, No. 1, 115-225
[16]. Chandrakant Badgaiyan, Ashish Kumar Dewangan, Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar Sinha, (2012). “A New Steganographic Technique: Image Hiding in Mobile Application”, International Journal of Advanced Computer and Mathematical Sciences, Vol 3, No. 4, 2012 pp 556-562