Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
16
Page No.
5854 - 5863
References
AL-Nabhani, Y., H.A. Jalab, A. Wahid and R.M. Noor, 2015. Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci., 27: 393-401.
CrossRef | Direct Link | Akhtar, N., S. Khan and P. Johri, 2014. An improved inverted LSB image steganography. Proceedings of the 2014 IEEE International Conference on ISSUES and Challenges in Intelligent Computing techniques (ICICT’14), February 7-8, 2014, IEEE, Ghaziabad, India, ISBN:978-1-4799-2899-6, pp: 749-755.
Alsarayreh, M.A., M.A. Alia and K.A. Maria, 2017. A novel image steganographic system based on exact matching algorithm and key-dependent data technique. J. Theor. Appl. Inf. Technol., 95: 1212-1224.
Direct Link | Bhattacharyya, S., P. Indu and G. Sanyal, 2013. Hiding data in text using Ascii Mapping Technology (AMT). Intl. J. Comput. Appl., 70: 29-37.
CrossRef | Direct Link | Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
CrossRef | Direct Link | Chen, P.Y. and H.J. Lin, 2006. A DWT based approach for image steganography. Int. J. Applied Sci. Eng., 4: 275-290.
Direct Link | Deshmukh, P.U. and T.M. Pattewar, 2014. A novel approach for edge adaptive steganography on LSB insertion technique. Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), February 27-28, 2014, IEEE, Chennai, India, ISBN:978-1-4799-3834-6, pp: 1-5.
Donald, H. and M.P. Baker, 1997. Computer Graphics C Version. Prentice Hall Publishing Company, Upper Saddle River, NJ, USA.
Efford, N., 2000. Digital Image Processing: A Practical Introduction using Java. Addison-Wesley Company, Boston, Massachusetts, USA., ISBN:9780201596236, Pages: 340.
Filler, T., J. Judas and J. Fridrich, 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inform. Forensics Secur., 6: 920-935.
CrossRef | Fridrich, J., M. Goljan and R. Du, 2001. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 8: 22-28.
CrossRef | Direct Link | Goyal, M., Y. Lather and V. Lather, 2015. Analytical relation and comparison of PSNR and SSIM on babbon image and human eye perception using matlab. Intl. J. Adv. Res. Eng. Appl. Sci., 4: 108-119.
Direct Link | Holub, V. and J. Fridrich, 2012. Designing steganographic distortion using directional filters. Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), December 2-5, 2012, IEEE, Tenerife, Spain, ISBN:978-1-4673-2285-0, pp: 234-239.
Hussain, M. and M. Hussain, 2013. A survey of image steganography techniques. Int. J. Adv. Sci. Technol., 54: 113-124.
Direct Link | Jain, Y.K. and R.R. Ahirwal, 2010. A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys. Intl. J. Comput. Sci. Secur., 4: 40-49.
Direct Link | Jindal, S. and N. Kaur, 2016. Digital image steganography survey and analysis of current methods. Intl. J. Comput. Sci. Inf. Technol. Secur., 6: 10-13.
Direct Link | Johnson, N.F. and S. Jajodia, 1998. Exploring steganography: Seeing the unseen. Computer, 31: 26-34.
CrossRef | Joshi, K., K. Puniani and R. Yadav, 2016. A review on different image steganography techniques. Digital Image Process., 8: 179-186.
Direct Link | Kaur, B., A. Kaur and J. Singh, 2011. Steganographic approach for hiding image in DCT domain. Intl. J. Adv. Eng. Technol., 1: 72-78.
Direct Link | Khalaf, E.T. and N. Sulaiman, 2011. A robust data hiding technique based on LSB matching. World Acad. Sci. Eng. Technol., 5: 1092-1096.
Direct Link | Khosravi, M., S. Soleymanpour-Moghaddam and M. Mahyabadi, 2012. Improved pair-wise LSB matching steganography with a new evaluating system. Proceedings of the 6th International Symposium on Telecommunications (IST), November 6-8, 2012, IEEE, Tehran, Iran, ISBN:978-1-4673-2072-6, pp: 982-986.
Kim, Y., Z. Duric and D. Richards, 2007. Modified Matrix Encoding Technique for Minimal Distortion Steganography. In: Lecture Notes in Computer Science, Camenisch, J.
et al. (Eds.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-74123-7, pp: 314-327.
Kukapalli, V.R., B.T. Rao and B.S. Reddy, 2014. Image steganography by enhanced pixel indicator method using Most Significant Bit (MSB) compare. Intl. J. Comput. Trends Technol., 15: 97-101.
CrossRef | Direct Link | Kumar, M. and M. Yadav, 2014. Image steganography using frequency domain. Intl. J. Sci. Technol. Res., 3: 226-230.
Direct Link | Lee, Y.K., G. Bell, S.Y. Huang, R.Z. Wang and S.J. Shyu, 2009. An advanced least-significant-bit embedding scheme for steganographic encoding. Adv. Image Video Technol., 5414: 349-360.
CrossRef | Li, B., J. He, J. Huang and Y.Q. Shi, 2011. A survey on image steganography and steganalysis. J. Inform.Hiding Multimedia Signal Process., 2: 142-172.
Direct Link | Luo, W., F. Huang and J. Huang, 2010. Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inform. Forensics Secur., 5: 201-214.
CrossRef | Luo, W., F. Huang and J. Huang, 2011. A more secure steganography based on adaptive pixel-value differencing scheme. Multimedia Tools Appli., 52: 407-430.
CrossRef | Muhammad, K., J. Ahmad, S. Rho and S.W. Baik, 2017. Image steganography for authenticity of visual contents in social networks. Multimedia Tools Appl., 76: 18985-19004.
CrossRef | Direct Link | Muhammad, K., M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, 2016. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Mult. Tools Appl., 75: 14867-14893.
CrossRef | Direct Link | Muhammad, K., M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, 2018. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener. Comput. Syst., 86: 951-960.
CrossRef | Direct Link | Nag, A., S. Biswas, D. Sarkar and P.P. Sarkar, 2010. A novel technique for image steganography based on block-DCT and huffman encoding. Int. J. Comput. Sci. Inform. Technol., 2: 103-112.
CrossRef | Direct Link | Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
CrossRef | Direct Link | Radhakrishnan, R., M. Kharrazi and N. Memon, 2005. Data masking: A new approach for steganography?. J. VLSI Signal Process. Syst. Signal Image Video Technol., 41: 293-303.
CrossRef | Direct Link | Raja, K.B., C.R. Chowdary, K.R. Venugopal and L.M. Patnaik, 2005. A secure image steganography using LSB, DCT and compression techniques on raw images. Proceedings of 3rd International Conference on Intelligent Sensing and Information Processing, December 14-17, 2005, Bangalore, India, pp: 170-176.
Rani, J. and T.A. Khan, 2014. Performance optimized DCT domain watermarking technique with JPEG. Intl. J. Innovative Technol. Exploring Eng., 4: 20-24.
Direct Link | Senarathne, A.N. and K. De Zoysa, 2014. ILSB: Indexing with least significant bit algorithm for effective data hiding. Intl. J. Comput. Appl., 161: 28-42.
Direct Link | Shen, S.Y. and L.H. Huang, 2015. A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur., 48: 131-141.
CrossRef | Direct Link | Singh, K.U., 2014. A survey on image steganography techniques. Intl. J. Comput. Appl., 97: 10-20.
Direct Link | Swain, G. and S.K. Lenka, 2015. A novel steganography technique by mapping words with LSB array. Intl. J. Signal Imaging Syst. Eng., 8: 115-122.
CrossRef | Direct Link | Tuama, A.Y., M.A. Mohamed, A. Muhammed and M.H. Zurina, 2017. Randomized pixel selection for enhancing LSB algorithm security against brute-force attack. J. Math. Stat., 13: 127-138.
CrossRef | Direct Link | Viswanatham, V.M. and J. Manikonda, 2010. A novel technique for embedding data in spatial domain. Intl. J. Comput. Sci. Eng., 2: 233-236.
Direct Link | Wang, S., B. Yang and X. Niu, 2010. A secure steganography method based on genetic algorithm. J. Inf. Hiding Multimedia Signal Process., 1: 28-35.
Direct Link | Wang, Y. and P. Moulin, 2006. Statistical modeling and steganalysis of DFT-based image steganography. Proceedings of SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents VIII Vol. 6072, February 15, 2006, SPIE, San Jose, California, USA., pp: 14-24.