| [1] | D. Alberts, R. Hayes, “Power to the edge: com mand and control in the information age,” Command and control Res. Prog. , 2003 |
| [2] | M. E. Steenstrup, Routing in Communication Networks, Prentice- Hall, 1st edition, 1995 |
| [3] | M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin, M. Z. I. Shamsuddin, “Information Hiding using Steganography,” Proc. 4th National Conf. on Telecommunication Technology, shah Alam, Malaysia, Jan. 2003, pp. 21-25 |
| [4] | H. J. Beker, F. C. Piper, “Communication Security. A Survey of Cryptography,” IEE Pro., Communications, Radar, and Signal Processing, vol. 129, no. 6, pp. 357-376, Aug. 1982, doi: 10.1049/ip-f-1:19820057 |
| [5] | N. Provos, P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security ans Privacy Journal, pp. 32-44, May-June 2003, doi: 10.1109/MSECP.2003.1203220 |
| [6] | B. Chen, G. Wornell, “Quantization Index Modulation: A Class of Provabily Good Methods for Digital Watermarking and Information Embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 563-593, Mar. 2003, doi: 10 . 110 9 /18 .923725 |
| [7] | G. Mastronardi, M. Castellano, F. Marino, “Steganography Effects in Various Formats of Images. A Preliminary Study,” Proc. Intr. Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, July 2001, pp. 116-119, doi: 10.1109/IDAACS.2001.941993 |
| [8] | M. Shirali -Shahreza, “A New Method for Real-Time Steganography,” Proc. 8th Int. Con. Signal Processing, vol. 4, 2006, pp. 16-20, doi: 10.1109/ICOSP.2006.345954 |
| [9] | M. Shirali-Shahreza, M. H. Shirali-Shahreza, “Text Steganography in SMS,” Proc. Int. Conf. Convergence Information Technology (ICCIT 07), Gyeongju, Korea, Nov. 2007, pp. 2260-2265, doi: 10.1109/ICCIT.2007.100 |
| [10] | D. Artz, “Digital Steganography: Hiding Data within Data” IEEE Internet Computing, vol. 5, no. 3, May 2001, pp. 75-80, doi: 10.1109/4236.935180 |
| [11] | P. Lalbakhsh, “Guide to Heaven”, Available online at: http://www.poetry.com/dotnet/P8152861/999/1/display.aspx |
| [12] | M. Shirali-Shahreza, “Stealth Steganography in SMS,” Proc. 3rd IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN 06), Banglore, India, April 2006, doi: 10.1109/WOCN.2006.1666572 |
| [13] | M. Shirali-Shahreza, “Steganography in MMS,” Proc. Int. Multitopic conf., Lahore, Pakistan, Dec. 2007, pp. 1-4, doi: 10.1109/INMIC.2007.4557698 |
| [14] | B. Liu, F. Liu, C. Yang, Y. Sun, “Secure Steganography in Compressed Video Bitstreams,” Proc. 3rd International Conf. on Availability, Reliability and Security, IEEE Press, 2008, pp. 1382-1387, doi:10.1109/ARES.2008.140 |
| [15] | M. Pooyan, A. Delforouzi, “LSB-based Audio Steganography Method Based on Lifting Wavelet Transform,” Proc. IEEE International Symp. On Signal Processing and Information Technology, 2007, pp. 600-603, doi: 10.1109/ISSPIT.2007.4458198 |
| [16] | P. Bao, X. Ma, “MP3-Resistant Music Steganography based on Dynamic Range Transform,” Proc. IEEE Int. Symp. Intelligent Signal Processing and Communication Systems, 2004, pp. 266-271, doi: 10.1109/ISPACS.2004.1439057 |
| [17] | K. Bailey, K. Curran, “An Evaluation of Image based Steganography Methods Using Visual Inspection and Automated Detection Techniques,” Multimedia Tools and Applications, vol. 30, no. 1, 2006, pp. 55-88, doi: 10.1007/ s11042-006-0008-4 |
| [18] | R. J. Anderson, F. A. P. Petitcolas, “On the Limits of Steganography,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, May 1998, pp. 474-481, doi: 10.1109/49.668971 |
| [19] | P. Lalbakhsh, A. Goodarzi, M. N. Fesharaki, “Towards Virtual Audio/Video Environments using Semantic Service Composition on a Service Ori ented Infrastructure,” Proc. Int. Con. Advanced Computer Control, (IC ACC 09), IEEE Press, Singapore, Jan. 2009, pp. 485-492 |
| [20] | Developing Web Services – Jbuilder 2005, Borland Software Corporation, USA, 2005 |
| [21] | M. W. Rennie, V. B. Misic, “Towards a Service-Based Architecture Description Language,” TR 04/08, Technical Report, University of Manitoba, Canada, August 2004 |
| [22] | Next Generation Networks, Office of the Director of Telecommunications Regulation, Documented No. Odtr01/88, Nov. 2001 |
| [23] | NCW Roadmap, Defence Publishing Center, Department of Defence, Canberra, ACT, 2005 |