This work is licensed under the Creative Commons Attribution 4.0 International License.
RERHMAN, A. – SABA, T. – MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – ANJUM, A.: Data hiding technique in steganography for information security using number theory, in J. of Information Science, Saudi Arabia, 2018.Search in Google Scholar
MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – SABA, T.: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, in J. of Vis. Commun. and Image Represent., Pakistan, 2018.Search in Google Scholar
JOHNSON, N. F. – JAJODIA, S.: Exploring steganography: Seeing the unseen, Computer, vol. 31(2), pp. 26–34, 1998.Search in Google Scholar
BHAYA, W. S. – HABBAL, A.: A comprehensive survey on steganography and steganalysis techniques and tools, in Int. J. of Computer Science and Information Security, vol. 14(5), pp. 287, 2016.Search in Google Scholar
ZAIDOON, K. H. – ABID, H. S. – ZAIDAN, B. B.: A review on intelligent procestwo concealment approaches: Steganography and cryptography, in Int. J. of Pure and Applied Mathematics, vol. 117(22), pp. 473–485, 2017.Search in Google Scholar
WANG, R. Z., – WANG, S. J.: Image hiding by optimal LSB substitution and genetic algorithm, in Pattern Recognition, vol. 37(3), pp. 469–480, 2004.Search in Google Scholar
CHEN, W. C. – HSU, C. F.: A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique, in IEEE Transactions on Information Forensics and Security, vol. 3(1), pp. 24–30, 2008.Search in Google Scholar
TORKAMAN, M. R. N. – KAZAZI, N. S. – ROUDDINI, A.: Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography, in Int. J. on New Computer Architectures and Their Applications, Malaysia, 2012.Search in Google Scholar
WESTFELD, A. – PFITZMANN, B.: Attacks on steganographic systems, in Int. Workshop on Information Hiding, pp. 61–76, Springer, 1999.Search in Google Scholar
PROVOS, N. – HONEYMAN, P.: Hide and seek: An introduction to steganography, in IEEE Security & Privacy, vol. 1(3), pp. 32–44, 2003.Search in Google Scholar
LI, B. – HE, J. – HUANG, J. – SHI, Y. Q.: A survey on image steganography and steganalysis, in J. of Information Hiding and Multimedia Signal Processing, 2(2), 142–172, 2008.Search in Google Scholar
KODOVSKÝ, J. – FRIDRICH, J. – HOLUB, V.: Ensemble classifiers for steganalysis of digital media, in IEEE Transactions on Information Forensics and Security, vol. 7(2), pp. 432–444, 2012.Search in Google Scholar
FRIDRICH, J. – KODOVSKÝ, J.: Rich models for steganalysis of digital images, in IEEE Transactions on Information Forensics and Security, vol. 7(3), pp. 868–882, 2012.Search in Google Scholar
MORKEL, T. – ELOFF, J.H.P. – OLIVIER, M.S.: An Overview of Image Steganography, in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa, 2005.Search in Google Scholar
CHEDDAD, A. – CONDELL, J. – CURRAN, K. – MC KEVITT, P.: Digital image steganography: Survey and analysis of current methods, in Signal Processing, vol. 90(3), pp. 727–752, 2010.Search in Google Scholar
WU, W. – LIN, Z. – WONG, W.: Application of QR-Code Steganography Using Data Embedding Technique, in Information Technology Convergence, pp. 597–605, 2013, DOI: 10.1007/978-94-007-6996-0_63.Search in Google Scholar
MAHESWARI, S. – HEMANTH, D.: Frequency domain QR code based image steganography using Fresnelet transform, in Int. J. of Electronics and Communications, vol. 69(2), pp. 539–544, 2015, DOI: 10.1016/j.aeue.2014.11.004.Search in Google Scholar
HAJDUK, V. – BRODA, M. – KOVÁČ, O. – LEVICKÝ, D.: Image steganography with using QR code and cryptography, in Int. Conf. Radioelektronika, pp. 4, 2016, DOI: 10.1109/RADIOELEK.2016.7477370.Search in Google Scholar