Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of Applied Computing, Buckingham Univ., Buckingham, UK. http://bear.buckingham.ac.uk/149/
Abdulla AA, Jassim SA, Sellahewa H (2013) Efficient high-capacity steganography technique. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents
Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping. International Conference on Research in Security Standardisation Research (SSR), Springer, UK, p 151–166
Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents
Alharbi F (2013) Novel steganography system using Lucas sequence. Int J Adv Comput Sci Appl 4:52–58
Google Scholar
Aroukatos N, Manes K, Zimeras S, Georgiakodis F (2012) Data hiding techniques in steganography using fibonacci and catalan numbers. International Conference on Information Technology: New Generations (ITNG), IEEE, p 392–396
Bas P, Filler T, Pevny T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS International Workshop on information hiding, Springer, vol. 6958, p 59–70
Bhattacharyya D, Dutta J, Das P, Bandyopadhyay R, Bandyopadhyay SK, Kim T-H (2009) Discrete fourier transformation based image authentication technique. 8th IEEE International Conference on Cognitive Informatics( ICCI'09), p 196–200
Calderbank A, Daubechies I, Sweldens W, Yeo B-L (1997) Lossless image compression using integer to integer wavelet transforms. International Conference on Image Processing, ICIP, p 596–599
Chan C-S (2009) On using LSB matching function for data hiding in pixels. Fundamenta Informaticae 96:49–59
Google Scholar
Chen P-Y, Lin H-J et al (2006) A DWT based approach for image steganography. International Journal of Applied Science and Engineering 4(3):275–290
Google Scholar
Cox IJ, Kalker T, Pakura G, Scheel M (2005) Information transmission and steganography. Proceeding of the 4th International Workshop on Digital Watermarking, Springer, vol. 3710, p 15–29
Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kauffman, Burlington
Google Scholar
Crandall R (1998) Some notes on steganography. Posted on steganography mailing list
Dey S, Abraham A, Sanyal S (2007) An LSB Data Hiding Technique Using Prime Numbers. Third International Symposium on Information Assurance and Security, IAS 2007, IEEE, p 101–108
Dey S, Abraham A, Sanyal S (2007) An LSB Data Hiding Technique Using Natural Number Decomposition. Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, IEEE, vol. 2, p 473–476
Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents, p 23–34
Fridrich J, Lisonek P, Soukal D (2007) On steganographic embedding efficiency. International Workshop on information hiding. Springer, p 282–296
Iranpour M, Farokhian F (2013) Minimal distortion steganography using well-defined functions. 10th International Conference on high Capacity Optical Networks and Enabling Technologies (HONET-CNS), Magosa, Cyprus, p 21–24
Ker AD (2005) Improved detection of LSB steganography in grayscale images. International Workshop on information hiding. Springer, p 97–115
Ker AD (2005) A general framework for structural steganalysis of LSB replacement. International Workshop on information hiding, Springer,vol. 3427, p 296–311
Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. Proc. SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents, vol. 6819
Ker AD, Bas P, Bohme R, Cogranne R, Craver S, Filler T, Fridrich J, Pevny T (2013) Moving steganography and steganalysis from the laboratory into the real world. Proceedings of the first ACM workshop on Information hiding and multimedia security, p 45–58
Lin G-S, Chan Y-T, Lie W-N (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Transactions on Multimedia 12:345–357
Article
Google Scholar
Lin Y-T, Wang C-M, Chen W-S, Lin F-P, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Transactions on Multimedia 19:196–211
Article
Google Scholar
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security 5:201–214
Article
Google Scholar
Mielikainen J (2006) LSB matching revisited. IEEE Signal Processing Letters 13:285–287
Article
Google Scholar
Picione DDL, Battisti F, Carli M, Astola J, Egiazarian K (2006) A Fibonacci LSB data hiding tecnique. 14th European Signal Processing Conference (EUSIPCO), p 1–5
Sharp T (2001) An implementation of key-based digital signal steganography. International Workshop on information hiding. Springer, p 13–26
Viterbi U (1981) USC-SIPI image database. USC University of Southren California
Westfeld A (2001) F5—a steganographic algorithm. International Workshop on Information hiding, Springer, USA, p 289–302
Zhang T, Ping X (2003) Reliable detection of LSB steganography based on the difference image histogram. AIEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP'03), vol. 1, p 54–548