[1. Yang, C.-H., C.-Y. Weng, S.-J. Wang, H.-M. Sun. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. – IEEE Transactions on Information Forensics and Security, Vol. 3, 2008, No 3, pp. 488-497.10.1109/TIFS.2008.926097]Search in Google Scholar
[2. Verma, M., R. Rani. Significant Secret Image Sharing Scheme Based on Boolean Operation. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 134-150.10.1515/cait-2017-0022]Search in Google Scholar
[3. Setiadi, D. R. I. M., T. Sutojo, E. H. Rachmawanto, C. A. Sari. Fast and Efficient Image Watermarking Algorithm Using Discrete Tchebichef Transform. – In: International Conference on Cyber and IT Service Management (CITSM’17), Denpasar, 2017.10.1109/CITSM.2017.8089229]Search in Google Scholar
[4. Nag, A., S. Biswas, D. Sarkar, Partha. Secret Image Sharing Scheme Based on a Boolean Operation. – Cybernetics and Iformation Technologies, Vol. 14, 2014, No 2, pp. 98-113.10.2478/cait-2014-0023]Search in Google Scholar
[5. Ardy, R. D., O. R. Indriani, C. A. Sari, D. R. I. M. Setiadi, E. H. Rachmawanto. Digital Image Signature Using Triple Protection Cryptosystem (RSA, Vigenere, and MD5). – In: International Conference on Smart Cities, Automation & Intelligent Computing Systems (ICON-SONICS’17), Yogyakarta, 2017.]Search in Google Scholar
[6. Setiadi, D. R. I. M., H. A. Santoso, E. H. Rachmawanto, C. A. Sari. An Improved Message Capacity and Security Using Divide and Modulus Function in Spatial Domain Steganography. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350670]Search in Google Scholar
[7. Setyono, A., D. R. I. M. Setiadi, Muljono. StegoCrypt Method Using Wavelet Transform and One-Time Pad for Secret Image Delivery. – In: International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17), Semarang, 2017.10.1109/ICITACEE.2017.8257703]Search in Google Scholar
[8. Zhu, Z., T. Zhang, P. Zhu, B. Wan, X. Hou. Steganalysis of AE-LSB Steganography Based on Pixel Value Differencing. – In: International Conference on Natural Computation (ICNC’13), Shenyang, 2013.10.1109/ICNC.2013.6818208]Search in Google Scholar
[9. Astuti, Y. P., D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari. Simple and Secure Image Steganography Using LSB and Triple XOR Operation on MSB. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018.10.1109/ICOIACT.2018.8350661]Search in Google Scholar
[10. Singla, D., M. Juneja. An Analysis of Edge Based Image Steganography Techniques in Spatial Domain. – In: Recent Advances in Engineering and Computational Sciences (RAECS’14), Chandigarh, 2014.10.1109/RAECS.2014.6799604]Search in Google Scholar
[11. Bai, J., C.-C. Chang, T.-S. Nguyen, C. Zhu, Y. Liu. A High Payload Steganographic Algorithm Based on Edge Detection. – Displays, Vol. 46, 2017, No 1, pp. 42-51.10.1016/j.displa.2016.12.004]Search in Google Scholar
[12. Islam, S., M. R. Modi, P. Gupta. Edge-Based Image Steganography. – EURASIP Journal on Information Security, Vol. 2014, 2014, No 1.10.1186/1687-417X-2014-8]Search in Google Scholar
[13. Irawan, C., D. R. I. M. Setiadi, C. A. Sari, E. H. Rachmawanto. Hiding and Securing Message on Edge Areas of Image Using LSB Steganography and OTP Encryption. – In: International Conference on Informatics and Computational Sciences (ICICoS’17), Semarang, 2017.10.1109/ICICOS.2017.8276328]Search in Google Scholar
[14. Mohamed, M. H., N. M. AL-Aidroos, M. A. Bamatraf. A Combined Image Steganography Technique Based on Edge Concept & Dynamic LSB. – International Journal of Engineering Research & Technology (IJERT), Vol. 1, 2012, No 8, pp. 1-7.]Search in Google Scholar
[15. Kalra, A., R. L. Chhokar. A Hybrid Approach Using Sobel and Canny Operator for Digital Image Edge Detection. – In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE’16), Ghaziabad, 2016.10.1109/ICMETE.2016.49]Search in Google Scholar
[16. Goodarzi, M. H., A. Zaeim, A. S. Shahabi. Convergence between Fuzzy Logic and Steganography for High Payload Data Embedding and More Security. – In: International Conference on Telecommunication Systems, Services, and Applications (TSSA’11), Bali, 2011.10.1109/TSSA.2011.6095421]Search in Google Scholar
[17. Singla, D., D. M. Juneja. New Information Hiding Technique Using Features of Image. – Journal of Emerging Technologies in Web Intelligence, Vol. 6, 2014, No 2, pp. 237-242.10.4304/jetwi.6.2.237-242]Search in Google Scholar
[18. Canny, J. A Computational Approach to Edge Detection. – IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. PAMI-8, 1986, No 6, pp. 679-698.10.1109/TPAMI.1986.4767851]Search in Google Scholar
[19. Nikolic, M., E. Tuba, M. Tuba. Edge Detection in Medical Ultrasound Images Using Adjusted Canny Edge Detection Algorithm. – In: Telecommunications Forum (TELFOR’16), Belgrade, 2016.10.1109/TELFOR.2016.7818878]Search in Google Scholar
[20. Kaur, P., B. Kaur. 2-D Geometric Shape Recognition Using Canny Edge Detection Technique. – In: International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016.]Search in Google Scholar
[21. Jin-Yu, Z., C. Yan, H. Xian-Xiang. Edge Detection of Images Based on Improved Sobel Operator and Genetic Algorithms. – In: International Conference on Image Analysis and Signal Processing, Linhai, 2009.]Search in Google Scholar
[22. Gao, W., X. Zhang, L. Yang, H. Liu. An Improved Sobel Edge Detection. – In: IEEE International Conference on Computer Science and Information Technology (ICCSIT’10), Chengdu, 2010.]Search in Google Scholar