Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(4), 313–336 (1996)
Google Scholar
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3–4), 313–336 (1996). doi:10.1147/sj.353.0313
CrossRef
Google Scholar
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Steganography based secure communication. In: Proceedings of the Second International Springer Conference on Soft Computing for Problem Solving (SocProS 2012), India (2012)
Google Scholar
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. 11(1), 221–225 (2011)
Google Scholar
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S.: Secure group communication with hidden group key. Inf. Secur. J. Glob. Perspect. 22(1), 21–34 (2013)
CrossRef
Google Scholar
Cox, J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proceedings of IEEE International Conference on Image Processing, vol. 111, pp. 243–246, Lausanne, Switzerland, Sept 1996
Google Scholar
Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)
CrossRef
MATH
MathSciNet
Google Scholar
Gander, W.: Algorithms for the QR decomposition. Res. Rep. 80(02), 1251–1268 (1980)
Google Scholar
Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB image based steganography. In: Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, pp. 18–21, Sharjah, UAE, 18–20 Mar 2008
Google Scholar
Keshari, S., Modani, S.G.: Image encryption algorithm based on chaotic map lattice and Arnold cat map for secure transmission. IJCST 2(1), 132–135 (2011)
Google Scholar
Kumar, V., Muttoo, S.K.: A graph theoretic approach to sustainable steganography. MIS Rev. Int. J. 17(1), 19–37 (2011)
Google Scholar
Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26, 117–129 (2005)
CrossRef
MATH
Google Scholar
Muttoo, S.K., Kumar, V.: Hiding message in map along pre Hamiltonian path. Int. J. Inf. Secur. Priv. 4(4), 21–34 (2010). doi:10.4018/jisp.2010100102
CrossRef
Google Scholar
Muttoo, S.K., Kumar, V.: Hamiltonian graph approach to steganography. Int. J. Electron. Secur. Digit. Forensic 3(4), 311–332 (2010). doi:10.1504/IJESDF.2010.038612
CrossRef
Google Scholar
Smith, J.R., Comisky, B.O.: Modulation and information hiding in images. In: Information Hiding. First International Workshop. Lecture Notes in Computer Science. Springer, Berlin (1996)
Google Scholar
Stalling, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, New York (1999)
Google Scholar
Staples, T., Weinman, L.: Adobe Photoshop CS2 for the Web: Hands-on Training. Peachpit Press, San Francisco (2005)
Google Scholar
Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn. 34, 671–683 (2000). doi:10.1016/S0031-3203(00)00015-7
CrossRef
Google Scholar