[1]
T.Kalker, G.Depovere, J.Haitsma and M.Maes, A Video Watermarking system for broadcast monitoring . In: SPIE Journals and Proceedings, 1999.
DOI: 10.1117/12.344661
Google Scholar
[2]
A.Sarkar, K. Solanki, U. Madhow, S. Chandrasekaran and B. S. Manjunath, Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security. IN: IEEE International Conference on Acoustics, Speech and Signal Processing, 2007.Volume: 2, Page(s): 277 – 280.
DOI: 10.1109/icassp.2007.366226
Google Scholar
[3]
W.Dai, Text Steganography System Using Markov Chain Source Model and DES Algorithm. In: JOURNAL OF SOFTWARE, VOL. 5, and NO. 7, JULY 2010 785.
DOI: 10.4304/jsw.5.7.785-792
Google Scholar
[4]
Spyridon K. Kapotas, Eleni E. Varsaki and Athanassios N. Skodras, Data Hiding in H.264 Encoded Video Sequences. In: IEEE International Conference on Multimedia Signal Processing, 2007.
DOI: 10.1109/mmsp.2007.4412894
Google Scholar
[5]
Anil Kumar and Navin Rajpal, Application of T-Code, Turbo Codes and Pseudo-Random Sequence for Steganography, Journal of Computer Science 2 (2): 148-153, 2006.
DOI: 10.3844/jcssp.2006.148.153
Google Scholar
[6]
C.M. Wang, N.I.W, C.S. Tsai, M.S. Hwang, A high quality steganographic method with pixel-value differencing and modulus function. In: The Journal of Systems and Software 2007 Elsevier.
DOI: 10.1016/j.jss.2007.01.049
Google Scholar
[7]
C.Ming Wang , N.Wu, C.S. Tsai, Min-Shiang Hwang, A high quality steganographic method with pixel-value differencing and modulus function. In: The Journal of Systems and Software Elsevier Inc, 2007.
DOI: 10.1016/j.jss.2007.01.049
Google Scholar
[8]
C.C. Chang, T.S. Chen, L.Z. Chung, A steganographic method based upon JPEG and quantization table modification, Information Sciences .141 (2002) 123–138.
DOI: 10.1016/s0020-0255(01)00194-3
Google Scholar
[9]
C.C. Chang , H.W. Tseng, A steganographic method for digital images using side match. In: Pattern Recognition Letters 25 (2004) 1431–1437.
DOI: 10.1016/j.patrec.2004.05.006
Google Scholar
[10]
D.C.Wu , W.H. Tsai, A steganographic method for images by pixel-value differencing. In: Pattern Recognition Letters 24 (2003) 1613–1626.
DOI: 10.1016/s0167-8655(02)00402-6
Google Scholar
[11]
K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K. Murali, Chaos Based Spread Spectrum Image Steganography. IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, MAY 2004.
DOI: 10.1109/tce.2004.1309431
Google Scholar
[12]
B.M. Rodriguez and G.L. Peterson, Multi-Class Classification Fusion using boosting for Identifying steganography Methods. In: SPIE Multisource Information Fusion: Architectures, Algorithms, and Applications March 17, 2008.
DOI: 10.1117/12.777328
Google Scholar
[13]
C.Chang, H.T.seng, A steganographic method for digital images using side match. In: Pattern Recognition Letters 25 (2004) 1431–1437.
DOI: 10.1016/j.patrec.2004.05.006
Google Scholar
[14]
D.C.Wu, W.H. Tsai, A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24 (2003) 1613–1626.
DOI: 10.1016/s0167-8655(02)00402-6
Google Scholar
[15]
K. Satish, T. Jayakar, Charles Tobin, K. Madhavi and K. Murali, Chaos Based Spread Spectrum Image Steganography. In: IEEE Transactions on Consumer 588 Electronics, Vol. 50, No. 2, MAY 2004.
DOI: 10.1109/tce.2004.1309431
Google Scholar