References
- Bhattacharyya S, Sanyal G. Hiding data in images using Pixel Mapping Method (PMM). Security and management; Las Vegas, NV: CSREA Press; 2010. p. 683–689.
- Chandramouli R, Kharrazi M, Memon N. Image steganography and steganalysis concepts and practice. In: Kalker T, Cox IJ, Ro YM, editors. IWDW; Berlin: Springer Verlag; 2003. p. 35–49.
- Anderson R, Petitcolas F. On the limits of steganography. IEEE J Sel Area Commun. 1998;16:474–481.
- Solanki K, Jacobsen N, Chandrasekaran S, et al. High-volume data hiding in images: introducing perceptual criteria into quantization based embedding. Proceedings of ICASSP; 2002 May; Orlando, FL; Vol. 4; p. 3485–3488.
- Wei D, Weiqi Y, Dongxu Q. Digital image scrambling technology based on Arnold transformation. J Comp Aided Des Comp Graphics. 2001;13:339–341.
- Simmons GJ. The prisoners’ problem and the subliminal channel. In: Advances in Cryptology – CRYPTO~’83’. New York: Springer Plenum; 1984. p. 51–67.
- Mukherjee S, Ash S, Sanyal G. A novel image steganographic approach by Pixel Position Modulus Method (PPMM). Computing for Sustainable Global Development (INDIACom). Second International Conference on Year-2015 IEEE Conference Publications, New Delhi; 2015.
- Morkel T, Eloff JHP, Olivier MS. An overview of image steganography. Pretoria: ISSA; 2005. p. 1–11.
- Mukherjee S, Sanyal G. A novel image steganographic technique using Position Power First Mapping (PPFM). IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata; 2015; p. 406–410.
- Shang Z, Ren H, Zhang J. A block location scrambling algorithm of digital image based on Arnold transformation. In: ICYCS. Washington, DC: IEEE Computer Society; 2008. p. 2942–2947.10.1109/ICYCS.2008.99
- Provos N, Honeyman P. Hide and seek: an introduction to steganography. Washington, DC: IEEE Computer Society; 2003.
- Ash S, Mukherjee S, Sanyal G. A DWT based steganographic method using Prime First Mapping (PFM). Advances in Computing and Communicational Engineering. ICACCE; Dehradun, India; 2015; p. 471–476.
- Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia. 2001;8:22–28.10.1109/93.959097
- Vijayalakshmi V, Zayaraz G, Nagaraj V. A modulo based LSB steganography method. In: International Conference on Control, Automation, Communication and Energy Conservation; Tamil Nadu, India; 2009 Jun 4–6; p. 1–4.
- Long B, Bo H. An improved steganographic method by pixel value differencing. J Circuit Syst. 2006;11:9–13.
- Chung-Ming W, Nan-i W, Chwei-shyong T. A high quality steganographic method with pixel value differencing and modulus function. J Syst Softw. 2008;81:150–158.
- Huang P, Chang K, Chang C, et al A novel image steganography method using tri-way pixel value differencing. J Multimedia. 2008;3:37–44.
- Potdar V, Chang E. Gray level modification steganography for secret communication. In: IEEE International Conference on Industrial Informatics; Berlin, Germany; 2004; p. 355–368.
- Ahmad T, Abdullah M. A novel steganographic method for gray-level images. Int J Comp Inf Syst Sci Eng. 2009;3:574–579.
- Bhattacharyya S, Khan A, Nandi A, et al Pixel Mapping Method (PMM) Based Bit Plane Complexity Segmentation (BPCS) steganography. In: WICT (World Congress on Information and Communication Technologies); Mumbai, India; 2011.
- Lan T, Mansour M, Tewfik A. Robust high capacity data embedding. In: ICIP; 2000; Vancouver, BC, Canada; p. 581–584.
- Kanan H, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41:6123–6130.10.1016/j.eswa.2014.04.022
- Almohammad A, Ghinea G. Stego-image quality and the reliability of PSNR. Image Processing Theory, Tools and Applications, IEEE ;University Evry Paris, France; 2010.10.1109/IPTA.2010.5586786
- Bhattacharyya S, Sanyal G. Study and analysis of quality of service in different image based steganography using Pixel Mapping Method. Int J Appl Inf Syst (UAIS). 2012;2:42–57.
- Hemalatha S, Acharya U, Renuka A, et al. A secure and high capacity image steganography technique. 2013; 4, CoRRabs 1304.3629:83–89.
- Sai N, Patil R. Image retrieval using equalized histogram image bins moments. Int J Signal Image Proc. 2011;2:9–12.
- Verhulp E, Rietbergen B, Huiskes R. A three-dimensional digital image correlation technique for strain measurements in microstructures. J Biomechan. 2004;37:1313–1320.10.1016/j.jbiomech.2003.12.036
- Lundin R, Lindskog S. An investigation of entropy of selectively encrypted bitmap images. In: CASoN, IEEE; Sao Carlos, Brazil; 2012. p. 238–243.10.1109/CASoN.2012.6412409
- Franz E. Steganography preserving statistical properties. 5th International Working Conference on Communication and Multimedia Security; London: Springer-Verlag; 2002.
- Ding M, Jing F. Digital image encryption algorithm based on improved Arnold transform. Int Forum Inf Technol Appl. 2010;1:174–176.
- Cachin C. An Information-Theoretic Model for Steganography. IACR Cryptology. ePrintArchive. 2000; p. 28.
- Eggers J, Bauml R, Girod B. A communications approach to image steganography. Proceedings of SPIE; San Jose, CA; 2002.
- Abdelfatah A, Tamimi A, Abdalla M. Hiding an Image inside another Image using Variable-Rate Steganography. Int J Adv Comp Sci Appl (IJACSA). 2013;4:18–21.