This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
M. Ramkumar & A.N. Akansu. “Some Design Issues For Robust Data hiding Systems”, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1528 – 1532, 1999Search in Google Scholar
N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding Information”, IEEE, pp. 113-116, 1998.Search in Google Scholar
R.Popa,”An Analysis of Steganographic System”, The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering, May 25, 1998.Search in Google Scholar
Kurak, C., and J. McHughes, “A Cautionary Note On Image Downgrading,” in IEEEComputer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159.Search in Google Scholar
Johnson, N. F., and S. Jajodia, “Exploring Steganography Seeing the Unseen, IEEE Computer, vol. 31, no. 2, 1998, pp. 26-34.10.1109/MC.1998.4655281Search in Google Scholar
F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.10.1109/5.771065Search in Google Scholar
Thomas Mittelholzer, An information-theoretic approach to steganography and watermarking,Information Hiding, pp.1-16,2006.10.1007/10719724_1Search in Google Scholar
C. Cachin, An Information-Theoretic Model for Steganography, Lecture Notes in Computer Science, vol.1525, pp.306-318, 199810.1007/3-540-49380-8_21Search in Google Scholar
A.Westfeld and A. Pfitzmann, “Attacks on Steganographic Systems,” Proc. Information Hiding—3rd Int’l Workshop, Springer Verlag, 1999, pp. 61–76.10.1007/10719724_5Search in Google Scholar
N. Provos, “Defending Against Statistical Steganalysis,” In Proceedings of USENIX Security Symposium, 2001, pp. 323–335.Search in Google Scholar
Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 34, 1996, pp. 131-336.10.1147/sj.353.0313Search in Google Scholar
Möller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First international Workshop, Proceedings, Springer, 1996, pp. 7-21.10.1007/3-540-61996-8_28Search in Google Scholar
Cox, I., et al., “A Secure, Robust Watermark for Multimedia,” in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 185-206.Search in Google Scholar
O. Runaidh, J. J. K., F. M. Boland, and O. Sinnen, “Watermarking Digital Images for Copyright Protection,, Image and Signal Processing, Aug. 1996, vol. 143, pp. 250–256.Search in Google Scholar
J.R. Hernandez, M. Amado, & F. PerezGonzalez, “DCTDomain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Trans. Image Processing, 9, Jan. 2000, 55-68.10.1109/83.81759818255372Search in Google Scholar
Wallace, G. K., The JPEG Still Picture Compression Standard, Communications of the ACM, vol. 34, no. 4, 1991, pp. 30-44.10.1145/103085.103089Search in Google Scholar
J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”, Proceedings of SPIE, vol.4675, pp.26-37, 2002.Search in Google Scholar
Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S. thesis, Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom,2008.Search in Google Scholar
Fridrich J., Goljan M., and Hogea D., “Attacking the OutGuess”, Proc.ACM Workshop Multimedia and Security, 2002.Search in Google Scholar
A. Westfeld. “F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001.10.1007/3-540-45496-9_21Search in Google Scholar
H. G. Schaathun. “CSM25: Secure Information Hiding”, Lecture Notes, University of Surrey, UK, 2008.Search in Google Scholar
http;//www.cs.washington.eduresearchimagedatabasegroundtruth_tars.for.downloadSearch in Google Scholar
Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani, “Steganography: Dct Coefficient Replacement Method andCompare With Jsteg Algorithm” International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 2012.10.7763/IJCEE.2012.V4.533Search in Google Scholar
Hideki Noda, Michiharu Niimi, and Eiji Kawaguchi, “High performance JPEG steganographyusing quantization index modulation in DCT domain” Pattern Recognition Letters 27, (2006). Issue 5, 455 – 46110.1016/j.patrec.2005.09.008Search in Google Scholar
Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648Search in Google Scholar
Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658Search in Google Scholar