References
- Naor M, Shamir A. Visual cryptography. In: Advances in Cryptology-EUROCRYPT'94. Springer; 1995. p. 1–12.
- Lin CC, Tsai WH. Secret image sharing with steganography and authentication. J Syst Softw. 2004;73(3):405–414. doi: 10.1016/S0164-1212(03)00239-5
- Yang CN, Chen TS, Yu KH, et al. Improvements of image sharing with steganography and authentication. J Syst Softw. 2007;80(7):1070–1076. doi: 10.1016/j.jss.2006.11.022
- Wu CC, Kao SJ, Hwang MS. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw. 2011;84(12):2196–2207. doi: 10.1016/j.jss.2011.06.021
- Kanan HR, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41(14):6123–6130. doi: 10.1016/j.eswa.2014.04.022
- Chang CC, Tai WL, Lin CC. A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol. 2006;16(10):1301–1308. doi: 10.1109/TCSVT.2006.882380
- Luo XY, Wang DS, Wang P, et al. A review on blind detection for image steganography. Signal Process. 2008;88(9):2138–2157. doi: 10.1016/j.sigpro.2008.03.016
- Wang S, Yang B, Niu X. A secure steganography method based on genetic algorithm. J Inf Hiding Multimedia Signal Process. 2010;1(1):28–35.
- Yang CH, Weng CY, Wang SJ, et al. Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensic Secur. 2008;3(3):488–497. doi: 10.1109/TIFS.2008.926097
- Wang Z, Bovik AC, Sheikh HR, et al. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600–612. doi: 10.1109/TIP.2003.819861
- Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004;37(3):469–474. doi: 10.1016/j.patcog.2003.08.007
- Ioannidou A, Halkidis ST, Stephanides G. A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl. 2012;39(14):11517–11524. doi: 10.1016/j.eswa.2012.02.106
- Alvarez G, Amigó JM, Arroyo D, et al. Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Chaos-based cryptography. Springer; 2011. p. 257–295.
- Duric Z, Jacobs M, Jajodia S. Information hiding: steganography and steganalysis. Handbook Statist. 2005;24:171–187. doi: 10.1016/S0169-7161(04)24006-8
- Li C, Li S, Alvarez G, et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A. 2007;369(1-2):23–30. doi: 10.1016/j.physleta.2007.04.023
- Wu DC, Tsai WH. A steganographic method for images by pixel-value differencing. Pattern Recognit Lett. 2003;24(9-10):1613–1626. doi: 10.1016/S0167-8655(02)00402-6
- Arroyo D, Alvarez G, Li S, et al. Cryptanalysis of a new chaotic cryptosystem based on ergodicity. Int J Modern Phys B. 2009;23(05):651–659. doi: 10.1142/S0217979209049966
- Hermassi H, Rhouma R, Belghith S. Security analysis of image cryptosystems only or partially based on a chaotic permutation. J Syst Softw. 2012;85(9):2133–2144. doi: 10.1016/j.jss.2012.04.031
- Chang CC, Hsieh YP, Lin CH. Sharing secrets in stego images with authentication. Pattern Recognit. 2008;41(10):3130–3137. doi: 10.1016/j.patcog.2008.04.006
- Doğan Ş. A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev. 2016;46(1):129–143. doi: 10.1007/s10462-016-9459-9
- Muhammad K, Sajjad M, Mehmood I, et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimedia Tools Appl. 2016;75(22):14867–14893. doi: 10.1007/s11042-015-2671-9
- Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia. 2001;8(4):22–28. doi: 10.1109/93.959097
- Janakiraman S, Thenmozhi K, Rajagopalan S, et al. Space filling curve for data filling: an embedded security approach. J Inf Technol. 2014;6:188–197.
- INFORMATICS I. PROGRAM GUIDE; 2013.