References
- RERHMAN, A. – SABA, T. – MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – ANJUM, A.: Data hiding technique in steganography for information security using number theory, in J. of Information Science, Saudi Arabia, 2018.
- MAHMOOD, T. – MEHMOOD, Z. – SHAH, M. – SABA, T.: A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform, in J. of Vis. Commun. and Image Represent., Pakistan, 2018.
- JOHNSON, N. F. – JAJODIA, S.: Exploring steganography: Seeing the unseen, Computer, vol. 31(2), pp. 26–34, 1998.
- BHAYA, W. S. – HABBAL, A.: A comprehensive survey on steganography and steganalysis techniques and tools, in Int. J. of Computer Science and Information Security, vol. 14(5), pp. 287, 2016.
- ZAIDOON, K. H. – ABID, H. S. – ZAIDAN, B. B.: A review on intelligent procestwo concealment approaches: Steganography and cryptography, in Int. J. of Pure and Applied Mathematics, vol. 117(22), pp. 473–485, 2017.
- WANG, R. Z., – WANG, S. J.: Image hiding by optimal LSB substitution and genetic algorithm, in Pattern Recognition, vol. 37(3), pp. 469–480, 2004.
- CHEN, W. C. – HSU, C. F.: A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique, in IEEE Transactions on Information Forensics and Security, vol. 3(1), pp. 24–30, 2008.
- TORKAMAN, M. R. N. – KAZAZI, N. S. – ROUDDINI, A.: Innovative Approach to Improve Hybrid Cryptography by Using DNA Steganography, in Int. J. on New Computer Architectures and Their Applications, Malaysia, 2012.
- WESTFELD, A. – PFITZMANN, B.: Attacks on steganographic systems, in Int. Workshop on Information Hiding, pp. 61–76, Springer, 1999.
- PROVOS, N. – HONEYMAN, P.: Hide and seek: An introduction to steganography, in IEEE Security & Privacy, vol. 1(3), pp. 32–44, 2003.
- LI, B. – HE, J. – HUANG, J. – SHI, Y. Q.: A survey on image steganography and steganalysis, in J. of Information Hiding and Multimedia Signal Processing, 2(2), 142–172, 2008.
- KODOVSKÝ, J. – FRIDRICH, J. – HOLUB, V.: Ensemble classifiers for steganalysis of digital media, in IEEE Transactions on Information Forensics and Security, vol. 7(2), pp. 432–444, 2012.
- FRIDRICH, J. – KODOVSKÝ, J.: Rich models for steganalysis of digital images, in IEEE Transactions on Information Forensics and Security, vol. 7(3), pp. 868–882, 2012.
- MORKEL, T. – ELOFF, J.H.P. – OLIVIER, M.S.: An Overview of Image Steganography, in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA 2005), Sandton, South Africa, 2005.
- CHEDDAD, A. – CONDELL, J. – CURRAN, K. – MC KEVITT, P.: Digital image steganography: Survey and analysis of current methods, in Signal Processing, vol. 90(3), pp. 727–752, 2010.
- WU, W. – LIN, Z. – WONG, W.: Application of QR-Code Steganography Using Data Embedding Technique, in Information Technology Convergence, pp. 597–605, 2013, DOI: 10.1007/978-94-007-6996-0_63.
- MAHESWARI, S. – HEMANTH, D.: Frequency domain QR code based image steganography using Fresnelet transform, in Int. J. of Electronics and Communications, vol. 69(2), pp. 539–544, 2015, DOI: 10.1016/j.aeue.2014.11.004.
- HAJDUK, V. – BRODA, M. – KOVÁČ, O. – LEVICKÝ, D.: Image steganography with using QR code and cryptography, in Int. Conf. Radioelektronika, pp. 4, 2016, DOI: 10.1109/RADIOELEK.2016.7477370.
