[1. Johnson, N. F., S. Jajodia. Exploring Steganography: Seeing the Unseen. – IEEE Computer, Vol. 31, 1998, No 2, pp. 26-34.10.1109/MC.1998.4655281]Open DOISearch in Google Scholar
[2. Kumar, R., S. Chand. A Reversible Data Hiding Scheme Using Bit Flipping Strategy. – Journal of Discrete Mathematical Sciences and Cryptography, Vol. 19, 2016, No 2, pp. 331-345.10.1080/09720529.2015.1085743]Search in Google Scholar
[3. Pradhan, A., A. K. Sahu, G. Swain, K. R. Sekhar. Performance Evaluation Parameters of Image Steganography Techniques. – In: Proc. of International Conference on Research Advances in Integrated Navigation Systems, 2016.10.1109/RAINS.2016.7764399]Search in Google Scholar
[4. Swain, G., S. K. Lenka. Classification of Image Steganography Techniques in Spatial Domain: A Study. – International Journal of Computer Science & Engineering Technology, Vol. 5, 2014, No 3, pp. 219-232.]Search in Google Scholar
[5. Wang, Z., A. Bovik. A Universal Image Quality Index. – IEEE Signal Processing Letters, Vol. 9, 2002, No 3, pp. 81-84.10.1109/97.995823]Open DOISearch in Google Scholar
[6. Sahu, A. K., M. Sahu. Digital Image Steganography Techniques in Spatial Domain: A Study. – International Journal of Pharmacy & Technology, Vol. 8, 2016, Issue 4, pp. 5205-5217.]Search in Google Scholar
[7. Wang, R., C. Lin, J. Lin. Hiding Data in Images by Optimal Moderately-Significant-Bit Replacement. – Electronics Letters, Vol. 36, 2000, No 25, pp. 2069-2070.10.1049/el:20001429]Open DOISearch in Google Scholar
[8. Wang, R. Z., C. F. Lin, J. C. Lin. Image Hiding by Optimal LSB Substitution and Genetic Algorithm. – Pattern Recognition, Vol. 34, 2001, No 3, pp. 671-683.10.1016/S0031-3203(00)00015-7]Search in Google Scholar
[9. Chan, C. K., L. M. Cheng. Hiding Data in Images by Simple LSB Substitution. – Pattern Recognition, Vol. 37, 2004, No 3, pp. 469-474.10.1016/j.patcog.2003.08.007]Search in Google Scholar
[10. Swain, G., S. K. Lenka. A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography. – International Journal of Security and Its Applications, Vol. 6, 2012, No 4, pp. 13-24.]Search in Google Scholar
[11. Fridrich, J., M. Goljan, R. Du. Reliable Detection of LSB Steganography in Grayscale and Color Images. – ACM Workshop on Multimedia and Security, 2001, pp. 27-30. http://doi.org/10.1145/1232454.123246610.1145/1232454.1232466]Open DOISearch in Google Scholar
[12. Wu, D. C., W. H. Tsai. A Steganographic Method for Images by Pixel-Value Differencing. – Pattern Recognition Letters, Vol. 24, 2003, No 9-10, pp. 1613-1626.10.1016/S0167-8655(02)00402-6]Open DOISearch in Google Scholar
[13. Yang, C. H., C. Y. Weng, S. J. Wang., H. M. Sun. Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. – IEEE Transactions on Information Forensics and Security, Vol. 3, 2008, No 3, pp. 488-497.10.1109/TIFS.2008.926097]Open DOISearch in Google Scholar
[14. Wu, H. C., N. I. Wu, C. S. Tsai, M. S. Hwang. An Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods. – IEE Proceedings on Vision Image Signal Processing, Vol. 152, 2005, No 5, pp. 611-615.10.1049/ip-vis:20059022]Search in Google Scholar
[15. Yang, C. H., C. Y. Weng, S. J. Wang., H. M. Sun. Varied PVD + LSB Evading Detection Programs to Spatial Domain in Data Embedding Systems. – Journal of Systems and Software, Vol. 83, 2010, No 10, pp. 1635-1643.10.1016/j.jss.2010.03.081]Search in Google Scholar
[16. Wang, C. M., N. I. Wu, C. S. Tsai, M. S. Hwang. A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function. – Journal of System and Software, Vol. 81, 2008, pp. 150-158.10.1016/j.jss.2007.01.049]Search in Google Scholar
[17. Liao, X., Q. Y. Wen, J. Zhang. A Steganographic Method for Digital Images with Four-Pixel Differencing and Modified LSB Substitution. – Journal of Visual Communication and Image Representation, Vol. 22, 2011, No 1, pp. 1-8.10.1016/j.jvcir.2010.08.007]Search in Google Scholar
[18. Swain, G. Digital Image Steganography Using Nine-Pixel Differencing and Modified LSB Substitution. – Indian Journal of Science and Technology, Vol. 7, 2014, No 9, pp. 1444-1450.10.17485/ijst/2014/v7i9.27]Search in Google Scholar
[19. Malik, A., G. Sikka, H. K. Verma. A Modified Pixel-Value Differencing Image Steganographic Scheme with Least Significant Bit Substitution Method. – International Journal of Image, Graphics and Signal Processing, Vol. 4, 2015, pp. 68-74.10.5815/ijigsp.2015.04.08]Search in Google Scholar
[20. Pradhan, A., K. R. Sekhar, G. Swain. Digital Image Steganography Based on Seven Way Pixel Value Differencing. – Indian Journal of Science &Technology, Vol. 9, 2016, No 37, pp. 1-11.10.17485/ijst/2016/v9i37/88557]Search in Google Scholar
[21. Pradhan, A., K. R. Sekhar, G. Swain. Digital Image Steganography Combining LSB Substitution with Five Way PVD in 2×3 Pixel Blocks. – International Journal of Pharmacy and Technology, Vol. 8, 2016, No 4, pp. 22051-22061.]Search in Google Scholar
[22. Swain, G. A Steganographic Method Combining LSB Substitution and PVD in a Block. – Procedia Computer Science, Vol. 85, 2016, pp. 39-44.10.1016/j.procs.2016.05.174]Search in Google Scholar
[23. Swain, G. Adaptive Pixel Value Differencing Steganography Using Both Vertical and Horizontal Edges. – Multimedia Tools and Applications, Vol. 75, 2016, No 21, pp.13541-13556.10.1007/s11042-015-2937-2]Search in Google Scholar
[24. Swain, G. Digital Image Steganography Using Variable Length Group of Bits Substitution. – Procedia Computer Science, Vol. 85, 2016, pp. 31-38.10.1016/j.procs.2016.05.173]Search in Google Scholar
[25. Juneja, M., P. S. Sandhu. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption. – In: Proc. of International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302-305.10.1109/ARTCom.2009.228]Search in Google Scholar
[26. Swain, G., S. K. Lenka. LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits. – In: Proc. of Global Trends in Information Systems and Software Applications, CCIS, 2012, pp. 479-488.10.1007/978-3-642-29216-3_52]Search in Google Scholar
[27. Swain, G., S. K. Lenka. A Novel Steganography Technique by Mapping Words with LSB Array. – International Journal of Signal and Imaging Systems Engineering, Vol. 8, 2015, No 1, pp. 115-122.10.1504/IJSISE.2015.067052]Search in Google Scholar
[28. Sahu, A. K., G. Swain. A Review on LSB Substitution and PVD Based Image Steganography Techniques. – Indonesian Journal of Electrical Engineering and Computer Science, Vol. 2, 2016, No 3, pp. 712-719.10.11591/ijeecs.v2.i3.pp712-719]Search in Google Scholar
[29. Sahu, A. K., G. Swain. An Improved Information Hiding Method Using Group of Bits Substitution. – International Journal on Communications Antenna and Propagation (IRECAP), Vol. 7, 2017, No 2, pp. 162-167.10.15866/irecap.v7i2.11675]Search in Google Scholar