1.
William Stallings, (2003) Cryptography and Network Security, Principles & Practices, third edition, Pearson Education, Singapore.
2.
B. Dunba. (2002). A detailed look at steganographic techniques and their use in an open system environment, Sans institute.
3.
C. Christian. An Information Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT laboratory.
4.
Jhonson, January 2002. Survey of Steganography Software, technical report.
5.
Krenn, R. "Steganography and Steganalysis", http://www.krenn.nl/univ/cry/steg/article.pdf
6.
Dey, S., Abraham, A., Sanyal, S. (2007, August). An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on (pp. 101-108). IEEE.
7.
Yu, L., Zhao, Y., Ni, R., Li, T. (2010). Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP Journal on Advances in Signal Processing, 2010, 32.
8.
Liao, X., Wen, Q. Y., Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
9.
Kumar, A., Kumari, S., Patro, S., Sh, T., Acharya, A. K. Image Steganography using Index based Chaotic Mapping., IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT 2015(1):1-4, January 2015.
10.
Zaghbani, S., Rhouma, R. (2013, April). Data hiding in spatial domain image using chaotic map. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on (pp. 1-5). IEEE.
11.
Anees, A., Siddiqui, A. M., Ahmed, J., Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
12.
Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
13.
Kanso, A. (2012). Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3287-3302.
14.
Juneja, M., Sandhu, P. S. (2013). An improved LSB based steganography technique for RGB color images. International Journal of Computer and Communication Engineering, 2(4), 513.
15.
Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
16.
Dasgupta, K., Mandal, J. K., Dutta, P. (2012). Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), 1-11.
17.
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
18.
Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4).
19.
The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, last accessed in February 2016.
20.
Zhou Wang and Alan C. Bovik (2009). Mean Squared Error: Love It or Leave It? A new look at signal fidelity measures. IEEE signal processing Magazine.
21.
www.merriam-webster.com/dictionary/cryptography.
22.
Suchi Agarwal, Dr. Jaipal Singh Bhist (2016). Data hiding in digital image processing using cryptography and steganography. IRJET, vol. 03, issue: 05.
23.
Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy. "Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps" International Journal of Computer Applications (0975 - 8887) Volume 138 - No.12, March 2016.
24.
Vipul Sharma, Madhusudan (2015). "Two new approaches for image steganography using cryptography", 2015 Third international conference on image information processing (ICIIP), 2015.
25.
Vipul Sharma, Sunny Kumar (2013). "A new approach to hide text in images using steganography". IJARCSSE (2013).
26.
Hassan Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud. "Data hiding in a digital cover image using chaotic maps & LSB technique", 2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
27.
Goel, Stuti, Arun Rana, and Manpreet Kaur. "ADCT-based Robust Methodology for Image Steganography", International Journal of Image Graphics and Signal Processing, 2013.
28.
Sharif, Ami, Majid Mollaeefar, and Mahboubeh Nazari. "A novel method for digital image steganography based on a new three-dimensional chaotic map", Multimedia Tools & Applications, 2016.
29.
J.K. Mandal, A. Khamrui. "A Genetic Algorithm based steganography in frequency domain (GASFD)", 2011 International Conference on Communication and Industrial Application, 2011.
30.
preview-springerplus.springeropen.com
31.
Abid Yahya. "Steanography Techniques for Digital Images", Springer Nature, 2019.
32.
Nadeem Akhtar, Pragati Johri, Shahbaaz Khan. "Enhancing the Security and Quality of LSB Based Image Steganography", 2013 5th International Conference on Computational Intelligence and Communication Networks, 2013.
33.
Reddy, Velagalapalli Lokeswara, Arige Subramanyam, and Pakanati CHenna Reddy. "A novel technique for JPEG image steganography and its performance evaluation", International Journal of Advanced Media and Communication, 2014.
34.
Jiang, Nan, Na Zhao, and Luo Wang. "LSB Based Quantum Image Steganography Algorithm", International Journal of Theoretical Physics, 2015.
35.
H. Nabaee, K.Faez. "An efficient steganography method based on reducing changes", 2010 25th International Conference of Image and Vision Computing New Zealand, 2010.
36.
Shabir A. Parah, Javaid A. Sheikh, Abdul M. Hafiz, G.M. Bhat. "Data hiding in scrambled images: A new double layer security data hiding technique", Computers & Electrical Engineering, 2014.
37.
Dadgostar, H., and F. Afsari. "Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB", Journal of Information Security and Applications, 2016.
38.
Prabira Kumar Sethy, Kamal Pradhan, Santi Kumar Behera. "A security enhanced approach for video Steganography using K-Means clustering and direct mapping", 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
39.
Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel. "Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid", Multimedia Tools & Applications, 2018.
40.
Maheshwari, S.Uma, and D.Jude Hemanth. "Different methodology for image steganography-based data hiding: review paper", International Journal of Information and Communication technology, 2015.
41.
Sajasi, Sara, and Amir-Masoud Eftekhari Moghadam. "An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method", Applied Soft Computing, 2015.
42.
Vinsa Varghese. "A secure method for hiding data on cubism image using hybrid feature detection method", International Journal of Research in Engineering and Technology, 2014.
43.
Omar Banimelhem, Lo'ai Tawalbeh, Moad Mowafi, Mohammed Al-Batati. "A more secure image hiding scheme using pixel adjustment and genetic algorithm", International Journal of Information Security and Privacy, 2013.
44.
M.Ghebleh, A. Kanso. "A robust chaotic algorithm for digital image steganography", Communications in Nonlinear Science and Numerical Simulation, 2014
45.
"Intelligent Systems Design and Applications", Springer Nature, 2018
46.
Dogan, Sengul. "A new data hiding method based on chaos embedded genetic algorithm for color image", Artificial Intelligence Review, 2016.
47.
Advances in Intelligent Systems and Computing, 2016.
48.
Sarosh K. Dastoor. "Comparative Analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices", 2011 World Congress on Information and Communication Technologies, 2011.