This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Prasad. M. Sitaram, Naganjaneyulu. S, Krishna. CH. Gopi, Nagaraju. C. “A Novel Information Hiding Technique for Security by Using Image Steganography,” Journal of Theoretical and Applied Information Technology (JATIT), vol. 8, no. 6, pp. 35-39, 2005 - 2009.Search in Google Scholar
YANG. Hengfu, SUN. Xingming, SUN. Guang.“A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution,”Radioengineering, vol. 18, no. 4, pp. 509-516, December 2009.Search in Google Scholar
Bender. W, Gruhl. D, Morimoto. N, Aiguo. LU.“Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.10.1147/sj.353.0313Search in Google Scholar
Jasril, Marzuki. Ismail, Rahmat. Faisal. “Modification Four Bits of Uncompressed Steganography Using Least Significant Bit (LSB) Method”. International Conference of Advance Computer and Information Systems (ICACSIS), pp. 287-292, Universitas Indonesia, Depok (Indonesia), 2013.Search in Google Scholar
YIP. Shu-Kei, AU. Oscar. C, WONG. Hoi-Ming, HO. Chi Wang.“Block-Based Lossless Data Hiding in Delta Domain,” Multimedia and Expo, IEEE International Conference, Toronto, Ontario (Canada), pp. 857-860, 2006.10.1109/ICME.2006.262636Search in Google Scholar
YANG. Ching-Yu.“Based Upon RBTC and LSB Substitution to Hide Data,” In Proc. First International Conference on Innovative Computing, Information and Control (ICICIC’06), Beijing (China), vol. 1, pp. 476-479, 2006.Search in Google Scholar
CHANG. Chin-Chen, LIN. Chia-Chen, TSENG.Chun-Sen, TAI.Wei-Liang.“Reversible Hiding in DCT-Based Compressed Images,” Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.Search in Google Scholar
YANG. You, YU. Ping, XU. Jiangfeng.“An Improved LSB Algorithm Based on MultiTransformation,” In Proc. International Symposium on Information Science and Engineering (ISISE’08). Shanghai (China), vol. 1, pp. 487-49, Dec. 20-22, 2008.Search in Google Scholar
Singh. Pradeep Kumar, Aggrawal. R.K. “Enhancement of LSB Based Steganography for Hiding Image in Audio,” International Journal on Computer Science and Engineering (IJCSE), vol. 02, no.05, pp. 1652-1658, 2010.Search in Google Scholar
THIEN. C. C, LIN. J. C. “A Simple and High-Hiding Capacity Method For Hiding Digit- by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, December 2003.Search in Google Scholar
CHANG. Chin-Chen, LIN. Min-Hui, HU.Yu-Chen.“A Fast and Secure Image Hiding Scheme Based on LSB Substitution,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.10.1142/S0218001402001770Search in Google Scholar
Sathisha. N, et al “Embedding Information in DCT Coefficients Based on Average Covariance”. International Journal of Engineering Science and Technology (IJEST), vol. 3 no. 4, pp. 3184-3194, April 2011.Search in Google Scholar
Hussain. HanizanShanker, et al. “A Novel Hybrid Fuzzy SVM Image Steganographic Model,” International Symposium in Information Technology, vol. 1, pp. 1-6, June 2010.10.1109/ITSIM.2010.5561300Search in Google Scholar
Jasril, Marzuki. Ismail.“Application Design to Embed Text and File to Uncompressed File with Least Significant Bit”. Journal of Computer Science, vol. 8 no. 2 pp. 137-151, UniveristasPelitaHarapan, Tangerang, (Indonesia), 2012.Search in Google Scholar
Habes. Alkhraisat.“Information Hiding in BMP Image Implementation, Analysis and Evaluation,” Saint Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Saint Petersburg, Russia, vol. 6, no. 1, pp. 1-10, February 2006.Search in Google Scholar
Saroha. Kriti, Singh. Pradeep Kumar. “A Variant of LSB Steganography for Hiding Images in Audio,” International Journal of Computer Applications, vol. 11, no.6, pp. 12-16, December 2010.10.5120/1588-2128Search in Google Scholar
Narayana. Sujay, Prasad. Gaurav.“Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions,” Signal& Image Processing: An International Journal (SIPIJ), vol.1, no.2, pp. 60-73, December 2010.10.5121/sipij.2010.1206Search in Google Scholar
Singh. Saurabh, Agarwal. Gaurav.“Hiding image to video: A new approach of LSB replacement,” International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6999-7003, December 2010.Search in Google Scholar
Rahul. Rishi, Sudhir. Batra, Rajkumar. “Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image,” International Journal of Computer Applications, vol. 13, no. 4, pp. 10-16, January 2011.10.5120/1770-2432Search in Google Scholar
Abu-Marie. Walaa, Gutub. Adnan, and Abu-Mansour. Hussein. “Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator”. International Journal of Signal and Image Processing, vol. 1, no. 3, pp. 196-204, 2010.Search in Google Scholar
Eric. Cole. “Hiding in Plain Sight: Steganography and the Art of Covert Communication,” Published by Wiley Publishing, Inc., Indianapolis, Indiana, Published simultaneously in Canada. 2003.Search in Google Scholar