| 1 |
THANGADURAI K, DEVI G S. An analysis of LSB based image steganography techniques. Proc. of International Conference on Computer Communication and Informatics, 2014: 1-4.
|
| 2 |
BRANDÃO A S, JORGE D C. Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 2016, 14 (3): 1361- 1366.
doi: 10.1109/TLA.2016.7459621
|
| 3 |
NTALIANIS K, TSAPATSOULIS N. Remote authentication via biometrics: a robust video-object steganographic mechanism over wireless networks. IEEE Trans. on Emerging Topics in Computing, 2016, 4(1): 156-174.
|
| 4 |
CHALLITA K, FARHAT H. Combining steganography and cryptography: new directions. International Journal on New Computer Architectures and Their Applications, 2011, 1 (1): 199- 208.
|
| 5 |
CHEDDAD A, CONDELL J, CURRAN K, et al. Digital image steganography: survey and analysis of current methods. Signal Processing, 2010, 90, 727- 752.
doi: 10.1016/j.sigpro.2009.08.010
|
| 6 |
PATEL P, PATEL Y. Secure and authentic DCT image steganography through DWT -SVD based digital watermarking with RSA encryption. Proc. of the 5th International Conference on Communication Systems and Network Technologies, 2015: 736-739.
|
| 7 |
LASKAR T A, HEMACHANDRAN K. Digital image watermarking techniques and its applications. International Journal of Engineering Research & Technology, 2013, 2 (3): 1- 8.
|
| 8 |
HUSSAIN M, HUSSAIN M. A survey of image steganography techniques. International Journal of Advanced Science and Technology, 2013, 54, 113- 123.
|
| 9 |
RAI P, GURUNG S, GHOSE M K. Analysis of image steganography techniques: a survey. International Journal of Computer Applications, 2015, 114 (1): 11- 17.
|
| 10 |
AHANI S, GHAEMMAGHAMI S. Colour image steganography method based on sparse representation. IET Image Processing, 2015, 9 (6): 496- 505.
doi: 10.1049/iet-ipr.2014.0351
|
| 11 |
KAUR S, BANSAL S, BANSAL R K. Steganography and classification of image steganography techniques. Proc. of International Conference on Computing for Sustainable Global Development, 2014: 870-875.
|
| 12 |
THANIKAISELVAN V, ARULMOZHIVARMAN P. High security image steganography using iwt and graph theory. Proc. of International Conference on Signal and Image Processing Applications, 2013: 337-342.
|
| 13 |
HEMALATHA S, RENUKA A, ACHARYA U D, et al. A secure image steganography technique using integer wavelet transform. Proc. of World Congress on Information and Communication Technologies, 2012: 755-758.
|
| 14 |
EL SAFY R O, ZAYED H H, EL DESSOUKI A. An adaptive steganographic technique based on integer wavelet transform. Proc. of International Conference on Networking and Media Convergence, 2009: 111-117.
|
| 15 |
PRABAKARAN G, BHAVANI R. A modified secure digital image steganography based on discrete wavelet transform. Proc. of International Conference on Computing, Electronics and Electrical Technologies, 2012: 1096-1100.
|
| 16 |
ADI P W, RAHMANTI F Z, ABU N A. High quality image steganography on integer haar wavelet transform using modulus function. Proc. of International Conference on Science in Information Technology, 2015: 79-84.
|
| 17 |
HEMALATHA S, ACHARYA U D, RENUKA A. Wavelet transform based steganography technique to hide audio signals in image. Procedia Computer Science, 2015, 47, 272- 281.
doi: 10.1016/j.procs.2015.03.207
|
| 18 |
CHANDRAN S, BHATTACHARYYA K. Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography. Proc. of International Conference on Electrical, Electronics, Signals, Communication and Optimization, 2015: 1-5.
|
| 19 |
CHAWLA G, KAMALDEEP, YADAV R, et al. Analysis of various image steganography techniques on the basis of normalized cross-correlation (NCC). International Journal of Advanced and Innovative Research, 2012, 2 (2): 243- 248.
|
| 20 |
Baby D, Thomas J, Augustine G, et al. A novel DWT based image securing method using steganography. Procedia Computer Science, 2015, 46, 612- 618.
doi: 10.1016/j.procs.2015.02.105
|
| 21 |
RAFTARI N, MOGHADAM A M E. Digital image steganography based on integer wavelet transform and assignment algorithm. Proc. of the 6th Asia Modelling Symposium, 2012: 87-92.
|
| 22 |
JUNEJA M, SANDHU P S. An improved LSB based steganography technique for RGB color images. Proc. of the 2nd International Conference on Latest Computational Technologies, 2013: 10-14.
|
| 23 |
MANDAL J K, DAS D. Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Sciences and Techniques, 2012, 2 (4): 83- 93.
doi: 10.5121/ijist.2012.2408
|
| 24 |
GULVE A K, JOSHI M S. An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Mathematical Problems in Engineering, 2015, 1- 11.
|
| 25 |
ELSHAZLY E A, ABDELWAHAB S A S, FIKRY R M, et al. FPGA implementation of robust image steganography technique based on least significant bit (LSB) in spatial domain. International Journal of Computer Applications, 2016, 145 (12): 43- 52.
doi: 10.5120/ijca2016910796
|