- A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný, “Moving Steganography and Steganalysis from laboratory to Real World,” In Proceedings of the ACM IH&MMSec’13, ACM, pp.ACM 978-1-4503-2081-8/13/06, Montpellier, France, June 2013.
- A. Bhatacharya, I. Banerjee, and G. Sanyal, “A survey of steganography and steganalysis techniques in image, text, audio and video cover carrier,” Journal of Global Research in Computer Science, vol. 2, no. 4, pp. 1-16, 2011.
- I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,” Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2nd revised dition, 2007.
- A. Cheddad, J. Condell, K. Curran, and P. Mckevitt, “Digital image steganography: Survey and analy sis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, March 2010.
- A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” in Lecture Notes in Computer Science, 1768, Springer-Verlag, Berlin, pp. 61-75, 2000.
- L. J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences, vol. 177, no. 15, pp. 3099-3109l, 2007.
- A. Westfeld, “Detecting low embedding rates,” in 5th International Workshop on Information Hiding, Noordwijk erhout, The Netherlands, 2002.
- K. Chin Chang, C. Ping Huang, S. Ping, and T. Te-Ming, “A novel image steganographic method using triway pixel-value differencing, “Journal of Multimedia, vol. 3, no. 2, pp. 37-44, June 2008.
- H. Malekmohammadi and S. Ghaemmaghami, “Steganalysis of LSB Based Image Steganography Using Spatial And Frequency Domain Feature,” IEEE Trans., 2009.
- H. Sajedi and M. Jamzad, “Selecting Steganography Method,” IEEE, 2010.
- G. Cancelli and M. Barni, “MPSteg-color: data hiding through redundant basis decomposition,” Inf Forensics Secur, IEEE Trans, vol. 4, no. 3, pp. 346–358, 2009.
- N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” Secur Privacy, IEEE Trans, vol. 1, no. 3, pp. 32–44, 2003.
- A. Westfeld, “F5 a steganographic algorithm,” in Information hiding, pp. 289–302, 2001.
- M. John Cioffi, “Digital Communication II: Coding,” Spring Quarter, 2005-2006.
- M. khatirinejad, “Linear codes for high payload steganography, “IEEE Trans., Elsevier, 2009.
- M. Carlos, “Hamming codes for wet paper steganography,” Springer Science Business, Media New York, 2015.
- J. Fridrich, “Steganography in Digital Media,” IEEE Trans,
- Binghamton University, State University of New York, 2008.
- M. Morad, “Polar codes for secret sharing,” Department of Mathematics Amirkabir University of Technolog, IEEE Trans, arXiv: 1705.03042 v1 [cs.CR], May 2017.
- J. Fridrich, “Efficient Wet Paper Codes,” IEEE Trans,
- Binghamton University, State University of New York (SUNY), 2014.
- W. Zhang, “Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes,” IEEE Trans, Zhengzhou 450002, China, 2009.
- J. urgen Bierbrauer and J. Fridrich, “Constructing good covering codes for applications in Steganography,” IEEE Trans, Binghamton University, State University of New York, (NY) 13902-6000, 2015.
- R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognit, vol. 34, no. 3, pp. 671–683, 2001.
- A. D. Ker, “Improved detection of LSB steganography in grayscale images,” in Information Hiding, pp. 97–115, 2004.
- J. Fridrich, P. Lisoněk, and D. Soukal, “On steganographic embedding efficiency,” in Computer Science, Alexandria, VA, pp. 282–296, July 2006.
- M. Zolanvar, H. Ghanei Yakhdan, and A. M. Latif, “A New Method in Color Images Watermarking based on YPbPr Color Space in FWHT Domain,” Journal Of Electronical & Cyber Defence , vol. 4, no. 4, Serial No. 16, 2017. (in Persian)
- A.Nourazar, "Images Steganography Based On Linear Codes and Provide an Method Optimal, " thesis Master of Science in Telecommunication Engineering Cipher and Security, Imam Hussein Comprehensive University, 2016 . (in Persian)
|