REFERENCES
[1] Khan, A., Siddiqa, A., Munib, S., and Malik, S.A., A recent survey of reversible watermarking techniques, Information Sciences, Vol. 279, 2014, pp. 251-272.
[2] Subhedar, M.S., Mankar, V.H., Current status and key issues in image steganography: A survey, Computer Science Review, Vol.13, No.14, 2014, pp. 95-113.
[3] Jung, K.H., Yoo, K.Y. Steganographic method based on interpolation and LSB substitution of digital images, Multimedia Tools and Applications, Vol.74, No.6, 2015, pp. 2143-2155.
[4] Khodaei, M., Faez, K., New adaptive steganographic method using least-significant-bit substation and pixel-value differencing, IET Image Processing, Vol.6, No.5, 2012, pp. 677–686.
[5] Chang, C.C., Lin, M.H., Hu, Y.C., A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition, Vol.16, 2002, pp. 399–416.
[6] Sharp, T. An implementation of key-based digital signal steganography, Information Hiding Workshop, Vol.2137, 2001, pp. 13-26.
[7] Mielikainen, J., LSB matching revisited. IEEE Signal Processing Letters, Vol.13, 2006, pp. 285–287.
[8] Chan, C.K., Cheng, L.M., Hiding data in images by simple LSB substitution, Pattern Recognition, Vol.37, 2004, pp. 469–474.
[9] Ker, A., Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, Vol.12, 2005, pp. 441–444.
[10] Wang, R.Z., Lin, C.F., Lin, J.C., Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, Vol.34, 2001, pp. 671–683.
[11] Lin, C.C., An information hiding scheme with minimal image distortion, Computer Standards & Interfaces, Vol.33, 2011, pp. 477-484.
[12] Xu, W.L., Chang, C.C., Chen, T.S., and Wang, L.M., An improved least-significant-bit substitution method using the modulo three strategy, Displays, Vol.42, 2016, pp. 36-42.
[13] Wu, N.I., Hwang, M.S., A novel LSB data hiding scheme with the lowest distortion, The Imaging Science Journal, Vol.65, No.6, 2017, pp. 371-378.
[14] Joshi, K. Yadav, R. Chawla. G., An enhanced method for data hiding using 2-bit XOR in image steganography, International Journal of Engineering and Technology, Vol.8, No.6, 2017, pp. 3043-3055.
[15] The USC-SIPI Image Database, http://sipi.usc.edu/database/ (access on November 2017)
|