Cite

1. Johnson, N. F., S. Jajodia. Exploring Steganography: Seeing the Unseen. – IEEE Computer, Vol. 31, 1998, No 2, pp. 26-34.10.1109/MC.1998.4655281Open DOISearch in Google Scholar

2. Kumar, R., S. Chand. A Reversible Data Hiding Scheme Using Bit Flipping Strategy. – Journal of Discrete Mathematical Sciences and Cryptography, Vol. 19, 2016, No 2, pp. 331-345.10.1080/09720529.2015.1085743Search in Google Scholar

3. Pradhan, A., A. K. Sahu, G. Swain, K. R. Sekhar. Performance Evaluation Parameters of Image Steganography Techniques. – In: Proc. of International Conference on Research Advances in Integrated Navigation Systems, 2016.10.1109/RAINS.2016.7764399Search in Google Scholar

4. Swain, G., S. K. Lenka. Classification of Image Steganography Techniques in Spatial Domain: A Study. – International Journal of Computer Science & Engineering Technology, Vol. 5, 2014, No 3, pp. 219-232.Search in Google Scholar

5. Wang, Z., A. Bovik. A Universal Image Quality Index. – IEEE Signal Processing Letters, Vol. 9, 2002, No 3, pp. 81-84.10.1109/97.995823Open DOISearch in Google Scholar

6. Sahu, A. K., M. Sahu. Digital Image Steganography Techniques in Spatial Domain: A Study. – International Journal of Pharmacy & Technology, Vol. 8, 2016, Issue 4, pp. 5205-5217.Search in Google Scholar

7. Wang, R., C. Lin, J. Lin. Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement. – Electronics Letters, Vol. 36, 2000, No 25, pp. 2069-2070.10.1049/el:20001429Open DOISearch in Google Scholar

8. Wang, R. Z., C. F. Lin, J. C. Lin. Image Hiding by Optimal LSB Substitution and Genetic Algorithm. – Pattern Recognition, Vol. 34, 2001, No 3, pp. 671-683.10.1016/S0031-3203(00)00015-7Search in Google Scholar

9. Chan, C. K., L. M. Cheng. Hiding Data in Images by Simple LSB Substitution. – Pattern Recognition, Vol. 37, 2004, No 3, pp. 469-474.10.1016/j.patcog.2003.08.007Search in Google Scholar

10. Swain, G., S. K. Lenka. A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography. – International Journal of Security and Its Applications, Vol. 6, 2012, No 4, pp. 13-24.Search in Google Scholar

11. Fridrich, J., M. Goljan, R. Du. Reliable Detection of LSB Steganography in Grayscale and Color Images. – ACM Workshop on Multimedia and Security, 2001, pp. 27-30. http://doi.org/10.1145/1232454.123246610.1145/1232454.1232466Open DOISearch in Google Scholar

12. Wu, D. C., W. H. Tsai. A Steganographic Method for Images by Pixel-Value Differencing. – Pattern Recognition Letters, Vol. 24, 2003, No 9-10, pp. 1613-1626.10.1016/S0167-8655(02)00402-6Open DOISearch in Google Scholar

13. Yang, C. H., C. Y. Weng, S. J. Wang., H. M. Sun. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. – IEEE Transactions on Information Forensics and Security, Vol. 3, 2008, No 3, pp. 488-497.10.1109/TIFS.2008.926097Open DOISearch in Google Scholar

14. Wu, H. C., N. I. Wu, C. S. Tsai, M. S. Hwang. An Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods. – IEE Proceedings on Vision Image Signal Processing, Vol. 152, 2005, No 5, pp. 611-615.10.1049/ip-vis:20059022Search in Google Scholar

15. Yang, C. H., C. Y. Weng, S. J. Wang., H. M. Sun. Varied PVD + LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems. – Journal of Systems and Software, Vol. 83, 2010, No 10, pp. 1635-1643.10.1016/j.jss.2010.03.081Search in Google Scholar

16. Wang, C. M., N. I. Wu, C. S. Tsai, M. S. Hwang. A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function. – Journal of System and Software, Vol. 81, 2008, pp. 150-158.10.1016/j.jss.2007.01.049Search in Google Scholar

17. Liao, X., Q. Y. Wen, J. Zhang. A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB Substitution. – Journal of Visual Communication and Image Representation, Vol. 22, 2011, No 1, pp. 1-8.10.1016/j.jvcir.2010.08.007Search in Google Scholar

18. Swain, G. Digital Image Steganography Using Nine-Pixel Differencing and Modified LSB Substitution. – Indian Journal of Science and Technology, Vol. 7, 2014, No 9, pp. 1444-1450.10.17485/ijst/2014/v7i9.27Search in Google Scholar

19. Malik, A., G. Sikka, H. K. Verma. A Modified Pixel-Value Differencing Image Steganographic Scheme with Least Significant Bit Substitution Method. – International Journal of Image, Graphics and Signal Processing, Vol. 4, 2015, pp. 68-74.10.5815/ijigsp.2015.04.08Search in Google Scholar

20. Pradhan, A., K. R. Sekhar, G. Swain. Digital Image Steganography Based on Seven Way Pixel Value Differencing. – Indian Journal of Science &Technology, Vol. 9, 2016, No 37, pp. 1-11.10.17485/ijst/2016/v9i37/88557Search in Google Scholar

21. Pradhan, A., K. R. Sekhar, G. Swain. Digital Image Steganography Combining LSB Substitution with Five Way PVD in 2×3 Pixel Blocks. – International Journal of Pharmacy and Technology, Vol. 8, 2016, No 4, pp. 22051-22061.Search in Google Scholar

22. Swain, G. A Steganographic Method Combining LSB Substitution and PVD in a Block. – Procedia Computer Science, Vol. 85, 2016, pp. 39-44.10.1016/j.procs.2016.05.174Search in Google Scholar

23. Swain, G. Adaptive Pixel Value Differencing Steganography Using Both Vertical and Horizontal Edges. – Multimedia Tools and Applications, Vol. 75, 2016, No 21, pp.13541-13556.10.1007/s11042-015-2937-2Search in Google Scholar

24. Swain, G. Digital Image Steganography Using Variable Length Group of Bits Substitution. – Procedia Computer Science, Vol. 85, 2016, pp. 31-38.10.1016/j.procs.2016.05.173Search in Google Scholar

25. Juneja, M., P. S. Sandhu. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. – In: Proc. of International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302-305.10.1109/ARTCom.2009.228Search in Google Scholar

26. Swain, G., S. K. Lenka. LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. – In: Proc. of Global Trends in Information Systems and Software Applications, CCIS, 2012, pp. 479-488.10.1007/978-3-642-29216-3_52Search in Google Scholar

27. Swain, G., S. K. Lenka. A Novel Steganography Technique by Mapping Words with LSB Array. – International Journal of Signal and Imaging Systems Engineering, Vol. 8, 2015, No 1, pp. 115-122.10.1504/IJSISE.2015.067052Search in Google Scholar

28. Sahu, A. K., G. Swain. A Review on LSB Substitution and PVD Based Image Steganography Techniques. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, 2016, No 3, pp. 712-719.10.11591/ijeecs.v2.i3.pp712-719Search in Google Scholar

29. Sahu, A. K., G. Swain. An Improved Information Hiding Method Using Group of Bits Substitution. – International Journal on Communications Antenna and Propagation (IRECAP), Vol. 7, 2017, No 2, pp. 162-167.10.15866/irecap.v7i2.11675Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology