[
1. Desoky, A. Noiseless Steganography. CRC Press, 2012.
]Search in Google Scholar
[
2. Abd El-Latif, A. A., B. Abd El-Att, S. E. Venegas-Andraca. A Novel Image Steganography Technique Based on Quantum Substitution Boxes. – Optics and Laser Technology, Vol. 116, 2019, pp. 92-102.10.1016/j.optlastec.2019.03.005
]Search in Google Scholar
[
3. Al-Afandy, K. A., O. S. Faragallah, A. Elmhalawy, E. S. M. El-Rabaie, G. M. El-Banby. High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography. – In: 4th International Colloquium on Information Science and Technology (CIST’16), IEEE, 2016, pp. 400-404.10.1109/CIST.2016.7805079
]Search in Google Scholar
[
4. Kumar, V., D. Kumar. Digital Image Steganography Based on Combination of DCT and DWT. – Communications in Computer and Information Science, Vol. 101, 2010, pp. 596-601.10.1007/978-3-642-15766-0_102
]Search in Google Scholar
[
5. Kumar, S. K., P. D. K. Reddy, G. Ramesh, V. R. Maddumla. Image Transformation Technique Using Steganography Methods Using LWT Technique. – International Information and Engineering Technology Assocation, Vol. 36, 2019, No 3, pp. 233-237.10.18280/ts.360305
]Search in Google Scholar
[
6. Juarez-Sandoval, O., M. Cedillo-Hernandez, G. Sanchez-Perez, K. Toscano-Medina, H. Perez-Meana, M. Nakano-Miyatake. Compact Image Steganalysis for LSB-Matching Steganography. – In: Proc. of 5th International Workshop on Biometrics and Forensics, IWBF, 2017.10.1109/IWBF.2017.7935103
]Search in Google Scholar
[
7. Kadhim, I. J., P. Premaratne, P. J. Vial, B. Halloran. Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research. – Neurocomputing, Vol. 335, 2019, pp. 299-326.10.1016/j.neucom.2018.06.075
]Search in Google Scholar
[
8. Mishra, M., P. Mishra, M. C. Adhikary. Digital Image Data Hiding Techniques: A Comparative Study. – Ansvesa, Vol. 7, 2014, No 2, pp. 105-115.
]Search in Google Scholar
[
9. Mishra, B., R. Beg, V. P. Singh. Information Security through Digital Image Steganography Using Multilevel and Compression Technique. – MIT International Journal of Computer Science & Information Technology, Vol. 3, 2013, No 1, pp. 26-29.
]Search in Google Scholar
[
10. Hu, D., L. Wang, W. Jiang, S. Zheng, B. Li. A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. – IEEE Transactions on Information Forensics and Security, Vol. 6, 2018, pp. 38303-38314.10.1109/ACCESS.2018.2852771
]Search in Google Scholar
[
11. Singh, S., R. Beg, T. J. Siddiqui. Robust Image Steganography Using Complex Wavelet Transform. – In: Proc. of International Multimedia, Signal Processing and Communication Technologies, IMPACT, 2013, pp. 56-30.10.1109/MSPCT.2013.6782087
]Search in Google Scholar
[
12. Hussain, M., A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, T. S. Jung. Image Steganography in Spatial Domain: A Survey. – Signal Processing: Image Communication Vol. 65, 2018, pp. 46-66.
]Search in Google Scholar
[
13. Zhou, Z., Y. Mu, Q. M. J. Wu. Coverless Image Steganography Using Partial-Duplicate Image Retrieval. – Soft Computing, Vol. 23, 2019, No 23, pp. 4927-4938.10.1007/s00500-018-3151-8
]Search in Google Scholar
[
14. Darwis, D., A. Junaidi, Wamiliana. A New Approach of Steganography Using Center Sequential Technique. – In: Journal of Physics: Conference Series. Vol. 1338. 2019.10.1088/1742-6596/1338/1/012063
]Search in Google Scholar
[
15. Juarez-Sandoval, O., A. Fierro-Radilla, A. Espejel-Trujillo, M. Nakano-Miyatake, H. Perez-Meana. Cropping and Noise Resilient Steganography Algorithm Using Secret Image Sharing. – In: Proc. of 6th International Conference on Graphic and Image Processing (ICGIP’14), Vol. 9443, 2015.10.1117/12.2179745
]Search in Google Scholar
[
16. Akar, F., Y. Yalman, H. S. Varol. Data Hiding in Digital Images Using a Partial Optimization Technique Based on the Classical LSB Method. – Turkish Journal of Electrical Engineering and Computer Sciences, Vol. 21, 2013, pp. 2037-2047.10.3906/elk-1205-58
]Search in Google Scholar
[
17. Setiadi, D. R. I. M., J. Jumanto. An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection. – Cybernetics and Information Technologies, Vol. 18, 2018, No 2, pp. 74-88.10.2478/cait-2018-0029
]Search in Google Scholar
[
18. Swain, G., S. K. Lenka. A Novel Steganography Technique by Mapping Words with LSB Array. – International Journal of Signal and Imaging Systems Engineering, Vol. 8, 2015, No 1-2, pp. 115-122.10.1504/IJSISE.2015.067052
]Search in Google Scholar
[
19. Alhumyani, H. Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform. – Cybernetics and Information Technologies, Vol. 20, 2020, No 1, pp. 68-81.10.2478/cait-2020-0005
]Search in Google Scholar
[
20. Wamiliana, M. Usman, A. Hijriani, Warsito, R. Setiawan. The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) Using File jpg/jpeg and png. – International Journal of Computer Science and Network Security, Vol. 17, 2017, No 7, pp. 174-179.
]Search in Google Scholar
[
21. Zhang, Y., C. Qin, W. Zhang, F. Liu, X. Luo. On the Fault-Tolerant Performance for a Class of Robust Image Steganography. – Signal Processing, Vol. 146, 2018, pp. 99-111.10.1016/j.sigpro.2018.01.011
]Search in Google Scholar
[
22. Zhang, X., F. Peng, M. Long. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. – IEEE Transactions on Multimedia. Vol. 20, 2018, No 12, pp. 3223-3238.10.1109/TMM.2018.2838334
]Search in Google Scholar
[
23. Wu, P., Y. Yang, X. Li. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network. – Future Internet, Vol. 10, 2018, pp. 1-15.10.3390/fi10060054
]Search in Google Scholar
[
24. Sahu, A. K., G. Swain, E. S. Babu. Digital Image Steganography Using Bit Flipping. – Cybernetics and Information Technologies, Vol. 18, 2018, No 1, pp. 69-80.10.2478/cait-2018-0006
]Search in Google Scholar