Journal of Engineering and Applied Sciences
Year:
2020
Volume:
15
Issue:
1
Page No.
247 - 251
References
Akhtar, N., V. Ahamad and H. Javed, 2017. A compressed LSB steganography method. Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), February 9-10, 2017, IEEE, Ghaziabad, India, ISBN:978-1-5090-6219-5, pp: 1-7.
Bagaskara, J.A. and T.W. Purboyo, 2016. Analysis and implementation of steganography on JPEG using LSB and spread spectrum method. ARPN. J. Eng. Appl. Sci., 14: 1244-1248.
Direct Link | Bagaskara, J.A., T.W. Purboyo and R.A. Nugrahaeni, 2017. Analysis of JPEG image steganography using spread spectrum method. Intl. J. Appl. Eng. Res., 12: 13944-13950.
Direct Link | Bashardoost, M., G.B. Sulong and P. Gerami, 2013. Enhanced LSB image steganography method by using knight tour algorithm, vigenere encryption and LZW Compression. Intl. J. Comput. Sci. Issues, 10: 221-227.
Direct Link | Chandramouli, R. and K.P. Subbalakshmi, 2003. Active steganalysis of spread spectrum image steganography. Proceedings of the 2003 International Symposium on Circuits and Systems ISCAS’03 Vol. 3, May 25-28, 2003, IEEE, Bangkok, Thailand, pp: 830-833.
Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef | Direct Link | Dewangga, I.G.A.P., T.W. Purboyo and R.A. Nugrahaeni, 2018. Comparison of digital image steganography based on techniques. J. Eng. Appl. Sci., 13: 4442-4446.
CrossRef | Direct Link | Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8: 22-28.
CrossRef | Direct Link | Gkizeli, M., D.A. Pados and M.J. Medley, 2007. Optimal signature design for spread-spectrum steganography. IEEE. Trans. Image Process., 16: 391-405.
CrossRef | Direct Link | Juzar, M.T. and R. Munir, 2016. Message hiding in animated GIF using multibit assignment method. Proceedings of the 2016 International Symposium on Electronics and Smart Devices (ISESD), November 29-30, 2016, IEEE, Bandung, Indonesia, ISBN:978-1-5090-3841-1, pp: 225-229.
Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE Trans. Image Process., 8: 1075-1083.
CrossRef | Direct Link | Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE. Trans. Image Proc., 8: 1075-1083.
CrossRef | PubMed | Direct Link | Morkel, T., J.H. Eloff and M.S. Olivier, 2005. An overview of image steganography. Proceedings of the 5th Annual Conference on Information Security South Africa, June 29-July 1, 2005, ISSA, Sandton, South Africa, pp: 1-11.
Morkel, T., J.H.P. Eloff and M.S. Olivier, 2005. An overview of image steganography. Proceedings of the 5th Annual Information Security South Africa Conference, June 29-June 1, Sandton, South Africa, pp: 1-12.
Munir, R., 2016. Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images. Proceedings of the 2016 2nd International Conference on Science in Information Technology (ICSITech), October 26-27, 2016, IEEE, Balikpapan, Indonesia, ISBN:978-1-5090-1722-5, pp: 58-62.
Walia, E., P. Jain and Navdeep, 2010. An analysis of LSB and DCT based steganography. Global J. Comput. Sci. Technol., 10: 4-8.
Direct Link | Xie, C., Y. Cheng and Y. Chen, 2010. Spread-spectrum steganalysis and PN sequence estimation. Proceedings of the 2010 3rd International Congress on Image and Signal Processing Vol. 9, October 16-18, 2010, IEEE, Yantai, China, ISBN:978-1-4244-6513-2, pp: 4143-4147.