Niels Provos and Peter Honeyman “Hide and Seek: An Introduction to Steganography” , IEEE Computer Society ,Vol.1,No.3, 2003,pp.32-44.10.1109/MSECP.2003.1203220
Philip Bateman and Dr. Hans “Image Steganography and Steganalysis”, M.S., Department of Computing Faculty of Engineering and Physical Sciences, University of Surrey Guildford Surrey, United Kingdom, 2008.
Hossein Sheisi, Jafar Mesgarian, and Mostafa Rahmani “Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm “,International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, August 201210.7763/IJCEE.2012.V4.533
Vijay and Vishal” A Steganography Algorithm for Hiding Image in Image by Improved LSB Substitution by Minimize Detection”, Theoretical and Applied Information Technology, Vol. 36, No.1,2012
Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr1”A Steganographic Method Based on DCT and New Quantization Technique”, International Journal of Network Security, Vol.16, No.3, PP.214-219, May 2014
[6]Ramandeep Kaur Toor and Ramanjot Kaur”A Steganographic Method Based Upon JPEG and Quantization Table Modification”, International Journal of Information Technology and
Knowledge Management ,NO.1,Vol.6, pp. 19-21, 2012
Mohit Kumar Goel & Neelu Jain “A Novel Steganographic Technique Based on LSB-DCT Approach” , in National Conference on Emerging Trends in Information and Computing Technologies NCETICT, 2012.
Chan, C.K. and Cheng. L.M. “Hiding Data in Image by Simple LSB Substitution”, Pattern Recognition, No.3, Vol.37, pp. 469 – 474, 2004.10.1016/j.patcog.2003.08.007
Chang,C.C and Tseng, H.W. “A Steganographic Method for Digital Images Using Side Match”, Pattern Recognition Letters,No.12, Vol.25, pp. 1431 – 1437, 2004.
Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique Using Modulus Arithmetic”, in 9th International Symposium on Signal Processing and Its Applications, pp. 1 – 4, 2007.10.1109/ISSPA.2007.4555443
W. Bender, D. Gruhl, N. Morimoto, and A. Lu,” Techniques for Data Hiding”, I.B.M. Systems Journal, No.3.4,Vol.35, pp. 313-336, 1996.10.1147/sj.353.0313
N. Nikolaidis, and I. Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal Processing, No.3,Vol.66, pp. 385-403, 199810.1016/S0165-1684(98)00017-6
T. Morkel, J. Eloff, and M. Olivier,”An Overview of Image Steganography”, In Proceedings of the Fifth Annual Information Security South Africa Conference ISSA, 2005.
Currie, D.L. & Irvine, C.E., “Surmounting the Effects of Lossy Compression on Steganography”, in19th National Information Systems Security Conference, 1996
D. Fu, Y. Shi, D. Zou, and G. Xuan. “JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain”, IEEE: 8th Workshop on Multimedia Signal Processing 2006, pp. 310313, 2006.
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt “Digital image steganography: Survey and analysis of current methods” , Signal Processing, No.3,Vol.90, pp 727–752,2010.10.1016/j.sigpro.2009.08.010
X. Li, J. Wang, “A Steganographic Method Based Upon JPEG and Particle Swarm Optimization Algorithm”, Information Sciences, No.15,Vol.177, pp. 3099–31091, 2007.
S.C.Mukhopadhyay, F.P.Dawson, M.Iwahara and S.Yamada, “A Novel Compact Magnetic Current Limiter for Three Phase Applications”, IEEE Transactions on Magnetics, Vol. 36, No. 5, pp. 3568-3570, September 2000.
Y.H. Yu, C.C. Chang, I.C. Lin,” A New Steganographic Method for Color and Grayscale Image Hiding”, Computer Vision and Image Under- standing, No.3,Vol.107, pp.183–194,2007.10.1016/j.cviu.2006.11.002
S.C.Mukhopadhyay, S. Deb Choudhury, T. Allsop, V. Kasturi and G. E. Norris, “Assessment of pelt quality in leather making using a novel non-invasive sensing approach”, Journal of Biochemical and Biophysical methods, Elsevier, JBBM Vol. 70, pp. 809-815, 2008.10.1016/j.jbbm.2007.07.00317707083
A.I. Hashad, A.S. Madani, A.E.M.A.” Wahdan, A Robust Steganography Technique Using Discrete Cosine Transform Insertion”, in IEEE/ITI Third International Conference on Information and Communications Technology, 2005, pp. 255–264.
N.K. Suryadevara, S.C. Mukhopadhyay, R. Wang, R.K. Rayudu, Forecasting the behavior of an elderly using wireless sensors data in a smart home, Engineering Applications of Artificial Intelligence, Volume 26, Issue 10, November 2013, Pages 2641-2652, ISSN 0952-1976, http://dx.doi.org/10.1016/j.engappai.2013.08.004.10.1016/j.engappai.2013.08.004
V.Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz” Color Image Steganography based on Pixel Value Modification Method Using Modulus Function” International Conference on Electronic Engineering and Computer Science, IERI Procedia 4, 2013, pp. 17 – 24.10.1016/j.ieri.2013.11.004
Yanmin LUO, Peizhong LIU and Minghong LIAO, An artificial immune network clustering algorithm for mangroves remote sensing, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648
Daode Zhang et al., Research on chips’ defect extraction based on image-matching, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 321 – 336, 2014.10.21307/ijssis-2017-658