You are on page 1of 3

S.Changder, N. C. Debnath, D.

Ghosh, A Greedy Approach to Text Steganography using


Properties of
Sentences, Proceedings of the 2011 Eighth International Conference on Information
Technology(ITNG
2011), ISBN: 978-0-7695-4367-3, pp. 30-35, Las Vegas, NV, USA.
F.G. Mohammadi, M.S. Abadeh
A survey of data mining techniques for steganalysis
Recent Advances in Steganography (2012), pp. 125
Geetha, S., Kamaraj, N., 2010. Optimized Image Steganalysis through Feature Sele
ction Using MBEGA. arXiv Preprint arXiv:1008.2824.
Sara Khosravi, Mashallah Abbasi Dezfoli, Mohammad Hossein Yektaie, A new stegano
graphy method based HIOP (Higher Intensity Of Pixel)
algorithm and Strassen's matrix multiplication, Journal of Global Research in Co
mputer Science, Vol. 2, No. 1, 2011.
Stallings, William, Network Security Essentials, applications and
Standards p.75, Pearson Education, Inch, 2007.( Technical report with
report number)
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Comple
xity Segmentation. JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, 108-112
Hamid.A.Jalab, A.A Zaidan and B.B Zaidan
Steganography and Steganalysis
J.R. Krenn 2004)
http://www.krenn.nl/univ/cry/steg/article.pdf
Dickman, S.D. (2007). An Overview of Steganography. Retrieved from http://ce.sha
rif.edu/courses/89-90/2/ce342-1/resources/root/Critical%20Reading%20Presentation
s/Steganography,%20Related%20Resources/2-An%20Overview%20of%20Steganography.pdf
World Applied Programming, Vol (1), No (3), August 2011. 191-195
Nosrati, M., Karimi, R., & Hariri, M. (2011). An introduction to steganography m
ethods
Sara Khosravi, Mashallah Abbasi Dezfoli, Mohammad Hossein Yektaie, A new stegano
graphy method based HIOP (Higher Intensity Of Pixel)
algorithm and Strassen's matrix multiplication, Journal of Global Research in Co
mputer Science, Vol. 2, No. 1, 2011.
Art of Hiding: An Introduction to Steganography. International Journal Of Engine
ering And Computer Science
Volume1 Issue 1 Oct 2012 Page No. 11-22 Maninder Singh Rana, Bhupender Singh San
gwan
, Jitendra Singh Jangir
Shashikala Channalli, Ajay Jadhav
Steganography An Art of Hiding DataInternational Journal on Computer Science and
Engineering Vol.1(3), 2009, 137-141
Ulrich, R., & Miller, J. (2004). Threshold estimation in two-alternative forced-
choice (2AFC) tasks: The SpearmanKrber method. Perception & Psychophysics
2004, 66 (3), 517-533.
V. Holub, J. Fridrich, T. Denemark
Random projections of residuals as an alternative to co-occurrences in steganaly
sis
Proceedings of SPIE, Electronic Imaging, Media Watermarking, Security, and Foren
sics XV (2013), p. 8665
Active steganalysis for interpolation-error based reversible data hiding
Pattern Recognition Letters, Volume 34, Issue 9, 1 July 2013, Pages 1032-1036
Der-Chyuan Lou, Chao-Lung Chou, Hung-Yuan Wei, Hui-Feng Huang
Image steganalysis using a bee colony based feature selection algorithm Original
Research Article
Engineering Applications of Artificial Intelligence, Volume 31, May 2014, Pages
35-43
F. Ghareh Mohammadi, M. Saniee Abadeh
A new steganography method which preserves histogram: Generalization of LSB++ Or
iginal Research Article
Information Sciences, In Press, Corrected Proof, Available online 8 February 201
4
Kazem Qazanfari, Reza Safabakhsh
A Text based Steganography Technique with Indian Root Original Research Article
Procedia Technology, Volume 10, 2013, Pages 167-171
Souvik Roy, P. Venkateswaran
Secret sharing with multi-cover adaptive steganography Original Research Article
Information Sciences, Volume 254, 1 January 2014, Pages 197-212
Hai-Dong Yuan
Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun
Adaptive data hiding in edge areas of images with spatial LSB domain systems
IEEE Trans. Informat. Forensics Secur., 3 (3) (2008), pp. 488497
S.Changder, N. C. Debnath, D.Ghosh, A Greedy Approach to Text Steganography using
Properties of
Sentences, Proceedings of the 2011 Eighth International Conference on Information
Technology(ITNG
2011), ISBN: 978-0-7695-4367-3, pp. 30-35, Las Vegas, NV, USA.
R. Chandramouli
A mathematical framework for active steganalysis
Multimedia Syst., 9 (3) (2003), pp. 303311
Groenewald, T. (2004). A Phenomenological Research Design Illustrated. Internati
onal Journal of Qualitative Methods 3(1). Retrieved from http://www.ualberta.ca/
~iiqm/backissues/3_1/pdf/groenewald.pdf
Christensen, L.B., Johnson, R.B., and Turner, L.A. (2010).Research methods,desig
n, and analysis (11th ed.). Boston, MA: Allyn & Bacon.
Aspers, P. (2009). Empirical Phenomenology: A Qualitative Research Apparoch (The
Cologne Seminars). Retrieved from http://www.ajol.info/index.php/ipjp/article/v
iewFile/61109/49294
Chaos based Edge Adaptive Image Steganography Original Research Article
Procedia Technology, Volume 10, 2013, Pages 138-146
Ratnakirti Roy, Anirban Sarkar, Suvamoy Changder
JPEG steganography detection with Benford's Law Original Research Article
Digital Investigation, Volume 9, Issues 34, February 2013, Pages 246-257
Panagiotis Andriotis, George Oikonomou, Theo Tryfonas
Secure Encrypted Steganography Graphical Password scheme for Near Field Communic
ation smartphone access control system Original Research Article
Expert Systems with Applications, Volume 41, Issue 7, 1 June 2014, Pages 3561-35
68
Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee Teh
Targeted Steganalysis of Edge Adaptive Image
Steganography Based on LSB Matching
Revisited Using B-Spline Fitting
Shunquan Tan, Bin Li
IEEE SIGNAL PROCESSING LETTERS, VOL. 19, NO. 6, JUNE 2012 336-339
Threshold estimation in
two-alternative forced-choice (2AFC) tasks:
The SpearmanKrber method
ROLF ULRICH
JEFF MILLER
Perception & Psychophysics
2004, 66 (3), 517-533
Bateman, P. (2008). Image Steganography and Steganalysis. Retrieved from http://
www.computing.surrey.ac.uk/personal/st/H.Schaathun/projects/Past/phil-msc.pdf

You might also like