References
- Prasad. M. Sitaram, Naganjaneyulu. S, Krishna. CH. Gopi, Nagaraju. C. “A Novel Information Hiding Technique for Security by Using Image Steganography,” Journal of Theoretical and Applied Information Technology (JATIT), vol. 8, no. 6, pp. 35-39, 2005 - 2009.
- YANG. Hengfu, SUN. Xingming, SUN. Guang.“A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution,”Radioengineering, vol. 18, no. 4, pp. 509-516, December 2009.
- Bender. W, Gruhl. D, Morimoto. N, Aiguo. LU.“Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3-4, pp. 313-336, 1996.10.1147/sj.353.0313
- Jasril, Marzuki. Ismail, Rahmat. Faisal. “Modification Four Bits of Uncompressed Steganography Using Least Significant Bit (LSB) Method”. International Conference of Advance Computer and Information Systems (ICACSIS), pp. 287-292, Universitas Indonesia, Depok (Indonesia), 2013.
- YIP. Shu-Kei, AU. Oscar. C, WONG. Hoi-Ming, HO. Chi Wang.“Block-Based Lossless Data Hiding in Delta Domain,” Multimedia and Expo, IEEE International Conference, Toronto, Ontario (Canada), pp. 857-860, 2006.10.1109/ICME.2006.262636
- YANG. Ching-Yu.“Based Upon RBTC and LSB Substitution to Hide Data,” In Proc. First International Conference on Innovative Computing, Information and Control (ICICIC’06), Beijing (China), vol. 1, pp. 476-479, 2006.
- CHANG. Chin-Chen, LIN. Chia-Chen, TSENG.Chun-Sen, TAI.Wei-Liang.“Reversible Hiding in DCT-Based Compressed Images,” Information Sciences, vol. 177, no. 13, pp. 2768-2786, 2007.
- YANG. You, YU. Ping, XU. Jiangfeng.“An Improved LSB Algorithm Based on MultiTransformation,” In Proc. International Symposium on Information Science and Engineering (ISISE’08). Shanghai (China), vol. 1, pp. 487-49, Dec. 20-22, 2008.
- Singh. Pradeep Kumar, Aggrawal. R.K. “Enhancement of LSB Based Steganography for Hiding Image in Audio,” International Journal on Computer Science and Engineering (IJCSE), vol. 02, no.05, pp. 1652-1658, 2010.
- THIEN. C. C, LIN. J. C. “A Simple and High-Hiding Capacity Method For Hiding Digit- by-Digit Data in Images Based on Modulus Function,” Pattern Recognition, vol. 36, no. 12, pp. 2875-2881, December 2003.
- CHANG. Chin-Chen, LIN. Min-Hui, HU.Yu-Chen.“A Fast and Secure Image Hiding Scheme Based on LSB Substitution,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 4, pp. 399-416, 2002.10.1142/S0218001402001770
- Sathisha. N, et al “Embedding Information in DCT Coefficients Based on Average Covariance”. International Journal of Engineering Science and Technology (IJEST), vol. 3 no. 4, pp. 3184-3194, April 2011.
- Hussain. HanizanShanker, et al. “A Novel Hybrid Fuzzy SVM Image Steganographic Model,” International Symposium in Information Technology, vol. 1, pp. 1-6, June 2010.10.1109/ITSIM.2010.5561300
- Jasril, Marzuki. Ismail.“Application Design to Embed Text and File to Uncompressed File with Least Significant Bit”. Journal of Computer Science, vol. 8 no. 2 pp. 137-151, UniveristasPelitaHarapan, Tangerang, (Indonesia), 2012.
- Habes. Alkhraisat.“Information Hiding in BMP Image Implementation, Analysis and Evaluation,” Saint Petersburg Institute for Informatics and Automation, Russian Academy of Sciences, Saint Petersburg, Russia, vol. 6, no. 1, pp. 1-10, February 2006.
- Saroha. Kriti, Singh. Pradeep Kumar. “A Variant of LSB Steganography for Hiding Images in Audio,” International Journal of Computer Applications, vol. 11, no.6, pp. 12-16, December 2010.10.5120/1588-2128
- Narayana. Sujay, Prasad. Gaurav.“Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions,” Signal& Image Processing: An International Journal (SIPIJ), vol.1, no.2, pp. 60-73, December 2010.10.5121/sipij.2010.1206
- Singh. Saurabh, Agarwal. Gaurav.“Hiding image to video: A new approach of LSB replacement,” International Journal of Engineering Science and Technology, vol. 2, no. 12, pp. 6999-7003, December 2010.
- Rahul. Rishi, Sudhir. Batra, Rajkumar. “Mode and Multiple Technique: A New Image Steganography Method for Capacity Enhancement of Message in Image,” International Journal of Computer Applications, vol. 13, no. 4, pp. 10-16, January 2011.10.5120/1770-2432
- Abu-Marie. Walaa, Gutub. Adnan, and Abu-Mansour. Hussein. “Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator”. International Journal of Signal and Image Processing, vol. 1, no. 3, pp. 196-204, 2010.
- Eric. Cole. “Hiding in Plain Sight: Steganography and the Art of Covert Communication,” Published by Wiley Publishing, Inc., Indianapolis, Indiana, Published simultaneously in Canada. 2003.