References
[1]. Samir K Bandyopadhyay, Debnath Bhattacharyya,
Debashis Ganguly, Swarnendu Mukherjee, Poulami Das,
(2008). “A Tutorial Review on Steganography ”,
International conference at JIIT.
[2]. Ahsan, K., & Kundur, D. (2002). “Practical Data hiding
in TCP/IP”, Proceedings of the Workshop on Multimedia
Security at ACM Multimedia.
[3]. F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn,
(1999). "Information hiding-a survey," Proceedings of the
IEEE, Vol. 87, Issue 7, pp. 1062-1078.
[4]. J.C. Judge, (2001). "Steganography: Past, Present,
Future," SANS white paper.
[5]. N.J. Hopper, (2004). Toward a theor y of
Steganography, Ph.D. Dissertation, School of Computer
Science Carnegie Mellon University, Pittsburgh, PA, USA,
[6]. M. Shirali-Shahreza, (2005). "An Improved Method for
Steganography on Mobile Phone," WSEAS Transactions on
Systems, Vol. 4, Issue 7, pp. 955-957.
[7]. F. Hartung and B. Girod, (1997). "Copyright Protection
in Video Delivery Networks by Watermarking of Pre-Compressed Video," Proceedings of Multimedia
Applications, Services and Techniques ECMAST '97'
Springer Lecture Notes in Computer Science, Vol. 1242,
Milan, Italy, pp. 423-436.
[8]. Abbas Cheddad, Joan Condell, Kevin Curran, Paul
Mc Kevitt, (2010). "Digital image steganography: Survey
and analysis of current methods" Elsevier, Signal
Processing, pp. 727-752.
[9]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, (1996).
“Techniques for data hiding”, IBM Systems Journal, Vol. 35,
Issue 3&4, 1996, pp. 313-336.
[10]. Zenon Hrytskiv, Sviatoslav Voloshynovskiy, Yuriy
Rytsav. “Cryptography and Steganography of Video
information in modern communication”, Electronics and
Energetics, Vol 11, No. 1, 115-225.
[11]. Chandrakant Badgaiyan, Ashish Kumar Dewangan,
Bhupesh Kumar Pandey, Keerti Yeulkar, Kaushal Kumar
Sinha, (2012). “A New Steganographic Technique: Image
Hiding in Mobile Application”, International Journal of
Advanced Computer and Mathematical Sciences, Vol 3,
issue 4, pp 556-562.
[12]. Chandrakant Badgaiyan, Mr. Ashish Kumar
Dewangan, (2013). “Implementation of Mobile Based
Steganography Technique on Non Touch Mobile Phones
Using Password Protection”, International Journal of
Information and Computation Technology, Vol. 3, No. 2,
Special issue.
[13]. Chandrakant Badgaiyan (2013). Payload Capacity
Enhancement in the Field of Steganography by Using
Mobile Application Based Stego Technique. i-manager’s
Journal on Software Engineering. 7(4), April-June, 2013
Print ISSN 0973-5151, E-ISSN 2230-7168, pp. 30-35.
[14]. Chandrakant Badgaiyan, (2014). “Performance
Assessment of Mobile Application Based Steganographic
Technique in Comparison with Other Existing
Steganography Techniques on Mobile Platform”,Inventi
Impact – Information Security, Issue No. 2.