References
[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya,
Debashis Ganguly, Swarnendu Mukherjee, Poulami Das,
(2008). “A Tutorial Review on Steganography ”,
International Conference 2008 at JIIT.
[2]. Ahsan, K., & Kundur, D. (2002). “Practical Data hiding
in TCP/IP”, Proceedings of the Workshop on Multimedia
Security at ACM Multimedia.
[3]. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn,
(1999). “Information hiding-a survey”, Proceedings of the
IEEE, Vol. 87, Issue 7, July 1999, pp. 1062-1078.
[4]. J.C. Judge, (2001). “Steganography: Past, Present,
Future”, SANS White paper, 30 November, 2001
[5]. N.J. Hopper (2004). “Toward a theor y of
Steganography”, Ph.D. Dissertation, School of Computer
Science Carnegie Mellon University, Pittsburgh, PA, USA,
July 2004.
[6]. M. Shirali-Shahreza (2005). “An Improved Method for
Steganography on Mobile Phone”, WSEAS Transactions on
Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). “Copyright Protection
in Video Delivery Networks by Watermarking of Pre-
Compressed Video”, Proceedings of Multimedia
Applications, Services and Techniques ECMAST '97'
Springer Lecture Notes in Computer Science, Vol. 1242,
Milan, Italy, May 1997, pp. 423-436.
[8]. M. Hassan Shirali-Shahreza, Mohammad Shirali-
Shahreza, (2007). “Sending Mobile Software Activation
Code by SMS Using Steganography ”, Intelligent
Information Hiding and Multimedia Signal Processing,
2007, IIHMSP 2007, Third International Conference on
2007, pp. 554-557.
[9]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul
Mc Kevitt, (2010). "Digital image steganography: Survey
and analysis of current methods" 2010, Elsevier, Signal
Processing, pp. 727-752.
[10]. Rosziati Ibrahim, Law Chia Kee, (2012). “MoBiSiS: An
Android-based Application for Sending Stego Image
through MMS”, ICCGI 2012: The Seventh International
Multi-Conference on Computing in the Global
Information Technology.
[11]. Mohammad Shirali Shahreza, (2006). “Stealth
Steganography in SMS”, IEEE Wireless and Optical
Communications Networks, 2006 IFIP International
Conference.
[12]. Mohammad Shirali-Shahreza, M. Hassan Shirali-
Shahreza, (2007). “Text Steganography in SMS”, 2007
International Conference on Convergence Information
Technology.
[13]. M. Hassan Shirali-Shahreza, Mohammad Shirali-
Shahreza, (2008). “Steganography in SMS by Sudoku
Puzzle” Computer Systems and Applications, 2008.
AICCSA 2008. IEEE/ACS International Conference,
pp.844-847.
[14]. Khan Farhan Rafat, (2009). “Enhanced Text
Steganography in SMS”, Computer, Control and
Communication, 2009, IC4 2009, 2nd International
Conference, pp. 1-6.
[15]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996).
“Techniques for data hiding”, IBM Systems Journal, vol. 35,
Issue 3&4, 1996, pp. 313-336.
[16]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy
Rytsav (1998). “Cryptography and Steganography of
Video information in modern communication”,
Electronics and Energetics, Vol 11, No. 1, pp.115-225.
[17]. Chandrakant Badgaiyan, Ashish Kumar Dewangan,
Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar
Sinha, (2012). “A New Steganographic Technique: Image
Hiding in Mobile Application”, International Journal of
Advanced Computer and Mathematical Sciences, Vol 3,
Issue 4, 2012, pp 556-562.
[18]. Chandrakant Badgaiyan, Ashish Kumar Dewangan,
(2012). “A New Method of Sending Mobile Software
Activation Key Using SMS Module”, CIIT International
Journal of Automation and Autonomous System, Vol 4, No
6, June 2012.
[19]. Chandrakant Badgaiyan, Mr. Ashish Kumar
Dewangan, (2013). “Implementation of Mobile Based
Steganography Technique on Non Touch Mobile Phones
Using Password Protection”, International Journal of
Information and Computation Technology, Volume 3,
Number 2, 2013, Special issue.
[20]. Chandrakant Badgaiyan, Mr. Ashish Kumar
Dewangan, (2012). “A Survey Paper on SMS Based
Steganography”, International Journal of Advanced
Computer and Mathematical Sciences, Vol 3, Issue 4,
2012, pp.441-445.
[21]. Chandrakant Badgaiyan, Mr. Ashish Kumar
Dewangan, (2013). “Payload Capacity Enhancement In
The Field Of Steganography By Using Mobile Application
Based Stego Technique”, i-manager's Journal on Software
Engineering, Vol. 7, No. 4,lApril - June 2013, pp.30-35.
[22]. Abdulaleem Z. Al-Othmani1, Azizah Abdul Manaf
and Akram M. Zeki, (2012). “A Survey on Steganography
Techniques in Real Time Audio Signals and Evaluation”,
IJCSI International Journal of Computer Science, Vol. 9,
Issue 1, No. 1, January 2012, pp. 30-37.