- I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,” Second edition, Morgan Kaufmann, Burlington, 2007.
- R. Bohem, “Advanced Statistical Steganalysis,” Springer-Verlag Berlin Heidelberg, 2010.
- D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel value differencing,” Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2003.
- S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995–2007, 2003.
- C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial
- LSB domain systems,” IEEE Trans. Inf., Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.
- L. Bin et al, “A Survey on Image Steganography and Steganalysis,” Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 2073-4212, 2011.
- W.-J. Chen, C.-C. Chang, and T. Le, “High payload steganography mechanism using Hybrid edge detector,” Expert Systems with applications, vol. 4, pp. 3292–3301, 2010.
- J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
- W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on LSB matching revisited,” IEEE Trans. Inf., Forensics Secur., vol. 5, no. 2, pp. 201-214, 2010.
- F. Huang, Y. Zhong, and J. Huang, “Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm,” Springer-Verlag Berlin Heidelberg, pp. 19-31, 2014.
- R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, http://os.inf.tu-dresden.de/˜westfeld/crandall.pdf 297, 1998.
- A. Westfeld, “High capacity despite better steganalysis (F5 - a steganographic algorithm),” in Proc. 4th Int. Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 289-302, 2001.
- H. Al-Dmour and A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding,” Expert Systems With Applications, vol. 46, pp. 293-306, 2016.
- G. Guanghua, Y. Zhao, and Z. Zhenfeng, “Integrated image representation based natural scene classification,” Expert Systems with Applications, vol. 38, pp. 11273-11279, 2011.
- K. Thulasiraman and M. N. S. Swamy, “Graphs Theory and Algorithms. Wiley-Interscience,” 1992.
- F. Malmberg, “Graph Based Method for Interactive Image Segmentation,” Digital Comprehensive Summarise of Uppsala Dissertations from the Faculty of science and Technology 813, pp. 51-59, 2011.
- N. Rashevsky, “Life, information theory and topology,” Bull. Math. Biophys, vol. 17, pp. 229-235, 1955.
- E. Trucco, “A note on the information content of graphs,” Bulletin of Mathematical Biology,” vol. 18, no. 2, pp. 129-135, 1956.
- A. Mowshowitz, “Entropy and the complexity of the graphs I,” an index of the relative complexity of a graph, Bulletin of Mathematical Biophysics 30, pp. 175-204, 1968.
- A. Mowshowitz, “Entropy and the complexity of graphs II: the information content of digraphs and infinite graphs,” Bulletin of Mathematical Biophysics 30, pp. 225-240, 1968.
- A. Mowshowitz, “Entropy and the complexity of graphs III: graphs with prescribed information content,” Bulletin of Mathematical Biophysics 30, pp. 387-414, 1968.
- A. Mowshowitz, “Entropy and the complexity of graphs IV: entropy measures and graphical structure,” Bulletin
- J. Körner, “Coding of an information source having ambiguous alphabet and the entropy of graphs,” in: Transactions of the Sixth Prague Conference on Information Theory, pp. 411-425, 1973.
- Z. Chen, M. Dehmer, and Y. Shi, “A Note on Distance-based Graph Entropies,” Journal of Entropy, vol. 16, pp. 5416-5427, 2014.
- K. Solanki, A. Sarkar, and B. S. Manjunath, “YASS: Yet another Steganographic Scheme That Resists Blind Steganalysis,” in Proc. 9th Int. Workshop on Information Hiding, Saint Malo, Brittany, pp. 16-31, 2007.
- http://dde.binghamton.edu/download/feature_extractors/
|