References
[1]. Simmons, G. J., (1984). “The Prisoners' Problem and
the Subliminal Channel”. In Advances in Cryptology,
Proceedings of CRYPTO '83, Plenum Press, pp. 51-67.
[2]. Chandramouli R, Kharrazi M, and Memon N, (2003).
“Image steganography and steganalysis: Concepts and
practice”. In Digital Watermarking, pp. 35-49. Springer
Berlin Heidelberg.
[3]. Luo, Weiqi, Fangjun Huang, and Jiwu Huang, (2010).
“Edge adaptive image steganography based on LSB
matching revisited”. Information Forensics and Security,
IEEE Transactions, Vol. 5, No. 2, pp. 201-214.
[4]. Cheddad A, Condell J, Curran K, and Mc Kevitt P,
(2010). “Digital image steganography: Survey and
analysis of current methods”. Signal Processing, Vol. 90,
No. 3, pp. 727-52.
[5]. Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, and
Cheng-Hsing Yang, (2011). “Anti-Forensics with
Steganographic Data Embedding in Digital Images”. IEEE
Journal on Selected Areas in Communications, Vol. 29,
No. 27, pp. 1392-1403.
[6]. V. Lokeswara Reddy, A. Subramanyam, and P.
Chenna Reddy, (2011). “Implementation of LSB
Steganography and its Evaluation for Various File
Formats”. International Journals of Advanced Networking
and Applications, Vol. 02, No. 05, pp. 868-872.
[7]. Sun HM, Weng CY, Lee CF, and Yang CH, (2011). “Antiforensics
with steganographic data embedding in digital
images”. Selected Areas in Communications, IEEE
Journal on, 2011, Vol. 29, No. 7, pp. 1392-1403.
[8]. Naghamhamid, Abid Yanhya, R. Badlishah Ahmad,
and Osamah M. Al-Qershi, (2012) . “ Image
Steganography Techniques : An Overview”. International
Journal of Computer Science and Security (IJCSS), Vol. 6,
No. 3.
[9]. M. Pavani, S. Naganjaneyulu, and C. Nagaraj,
(2013). “A survey on LSB based steganography methods”.
International Journal of Engineering and Computer
Science, Vol. 2, No. 8, pp. 2464-2467.
[10]. Eltyeb E. Abed Elgabar, and Haysam A. Ali Alamin,
(2013). “Comparison of LSB Steganography in GIF and
BMP Images”. International Journal of Soft Computing
and Engineering (IJSCE), Vol. 3, No. 4.
[11]. Jassim F A, (2013). “A novel steganography
algorithm to hide a grayscale BMP image in two grayscale
BMP images for dual secrecy”. In Information Assurance
nd (NCIA), 2 National Conference on, IEEE, pp. 73-77.
[12]. Jasleen Kour, and Deepankar Verma, (2014).
“Steganography techniques – A review paper”. International
Journal of Emerging Research in Management &
Technology, Vol. 3, No. 5.
[13]. Greg Kipper, (2004). The Book of Investigator's Guide
to Steganography, ISBN:0849324335, Auerbach Publications
© (240 pages).
[14]. Stefan Katzen, (2000). The Book of Information
Hiding Techniques for Steganography & Digital
Watermarking. Fabien A. P. Petitcolas.