[1] | Johnson, N. F. and Jajodia, S, “Exploring steganography: Seeing the unseen”, IEEE Computer Magazine, pp.26-34, February 1998. |
[2] | S.K.Bandyopadhyay, Debnath Bhattacharyya, Poulumi Das, S. Mukherjee, D. Ganguly, “A Tutorial Review on Steganography”, IC3 Noida, pp. 106-114, August 2008. |
[3] | Kh. Manglem Singh, S. Birendra Singh and L. Shyam Sundar Singh, “Hiding Encrypted Message in the Features of Images”, IJCSNS, VOL. 7, No.4, April 2007. |
[4] | Sutaone, M.S., Khandare, M.V, “Image based steganography using LSB insertion technique”, IEEE WMMN,pp. 146-151, January 2008. |
[5] | M. Dobsicek, “Extended steganographic system”, 8th International Student Conference on Electrical Engineering, Poster 04,FEE CTU 2004. |
[6] | Nameer N. EL-Emam, “Hiding a large amount of data with high security using steganography algorithm”, Journal of Computer Science, Page(s): 223 – 232, April 2007. |
[7] | G. Sahoo & R. K. Tiwari, “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization”, IJCSNS, Vol. 8, No. 1, pp. 228-233, January 2008. |
[8] | Moulin P and Koetter R, "Data-hiding codes", Proceedings of the IEEE, 93 (12), pp 2083-2126, 2005, |
[9] | Krenn, R., “Steganography and Steganalysis”, http://www. krenn.nl/ niv/cry/steg/article.pdf. |
[10] | Johnson N.F. and Jajodia S, "Exploring steganography: Seeing the Unseen", IEEE Computer, 31(2), pp 26-34, 1998. |
[11] | N. F. Johnson and S. Katzenbeisser, “A survey of steganographic techniques”, in S. Katzenbeisser and F.Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000. |
[12] | Li, Zhi., Sui, Ai, Fen., and Yang, Yi, Xian. “A LSB steganography detection algorithm”, IEEE Proceedings on Personal Indoor and Mobile Radio Communications: 2780-2783, 2003. |
[13] | J. Fridrich and M. Goljan, "Digital image steganography using stochastic modulation", SPIE Symposium on Electronic Imaging, San Jose, CA, 2003. |
[14] | Alkhrais Habes, “4 least Significant Bits Information Hiding Implementation and Analysis”, ICGST Int. Conf. on Graphics, Vision an, 2004. |
[15] | Ilker DALKIRAN, Kenan DANIS MAN, ―”Artificial neural network based chaotic generator for cryptology”, Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010. |
[16] | G. S. Rath & Satish Kumar Pradhan ―”Cryptography using Artificial Neural Networks”, 2009. |
[17] | Narendra Kumar Kamila ,Pradeep Kumar Mallick ,”Crypto Steganography using linear algebraic equation”, International Journal of Computer & communication Technology Volume-2 Issue-VIII, 2011. |
[18] | Ritesh Mukherjee and Nabin Ghoshal, “Steganography based Visual Cryptography”, Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) Advances in Intelligent Systems and Computing Volume 199, pp 559-566, 2013. |
[19] | G.Prema and S. Natarajan, “Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application”, Proceedings of International Conference on Information communication and Embedded Systems, 727-730, IEEE Xplore digital library, 2013. |
[20] | Joshi Rana, Amanpreet Kaur and Nitin Malik, “Network based Steganography”, International Journal of Computer Applications, Vol. 74(4),12-16, 2013. |
[21] | Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem and Ahmed S. Sakr, “A Steganographic Method Based on DCT and New Quantization Technique”, International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014. |
[22] | Gang Yang and Junyan Yi, “Delayed chaotic neural network with annealing controlling for maximum clique problem”, Advances in Intelligent Systems(Special Issue),Vol. 127,114-123, Elsevier, 2014. |