References
- Kahn D. The codebreakers: the comprehensive history of secret communication from ancient times to the internet. Simon and Schuster; 1996 Dec 5.
- Bernstein DJ. Introduction to post-quantum cryptography. In: Post-quantum cryptography. Berlin: Springer; 2009. p. 1–14.
- Wang RZ, Lin CF, Lin JC. Hiding data in images by optimal moderately-significant-bit replacement. Electron Lett. 2000 Dec 7;36(25):2069–2070.
- Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004 Mar 31;37(3):469–474.
- Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett. 2006 Nov;10(11):781–783.
- Lee IS, Tsai WH. Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recognit. 2009 Jul 31;42(7):1604–1611.
- Chang CC, Kieu TD, Wu WC. A lossless data embedding technique by joint neighboring coding. Pattern Recognit. 2009 Jul 31;42(7):1597–1603.
- Kanan HR, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014 Oct 15;41(14):6123–6130.
- Hassaballah M, editor. Digital media steganography: principles, algorithms, and advances. Academic Press; 2020 Jun 27.
- Mandal JK, Khamrui A. A genetic algorithm based steganography in frequency domain (GASFD). In: 2011 International Conference on Communication and Industrial Application. IEEE; 2011 Dec 26. p. 1–4.
- Ghasemi E, Shanbehzadeh J, Fassihi N. High capacity image steganography using wavelet transform and genetic algorithm. In: World Congress on Engineering 2012; Vol. 2188; 2012 Jul 4–6; London: International Association of Engineers; 2010 Mar. p. 495–498.
- AbdelWahab OF, Hussein AI, Hamed HF, et al. Hiding data in images using steganography techniques with compression algorithms. Telkomnika. 2019 Jun 1;17(3):1168–1175.
- Wang C, Ma B, Xia Z, et al. Geometric resistant polar quaternion discrete Fourier transform and its application in color image zero-hiding. ISA Trans. 125, 2021 Jun 18.
- Bhardwaj R. An improved reversible and secure patient data hiding algorithm for telemedicine applications. J Ambient Intell Humaniz Comput. 2021 Feb;12(2):2915–2929.
- Lin C-C, Tsai W-H. Secret image sharing with steganography and authentication. J Syst Softw. 2004;73(3):405–414.
- Yang C-N, Chen T-S, Yu KH, et al. Improvements of image sharing with steganography and authentication. J Syst Softw. 2007;80(7):1070–1076.
- Chang C-C, Hsieh Y-P, Lin C-H. Sharing secrets in stego images with authentication. Pattern Recognit. 2008;41(10):3130–3137.
- Wu C-C, Kao S-J, Hwang M-S. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw. 2011;84(12):2196–2207.
- Hassaballah M, Hameed MA, Aly S, et al. A color image steganography method based on ADPVD and HOG techniques. In: Digital media steganography. Academic Press; 2020 Jan 1. p. 17–40.
- Hassaballah M, Hameed MA, Awad AI, et al. A novel image steganography method for industrial internet of things security. IEEE Trans Industr Inform. 2021 Jan 22;17(11):7743–7751.
- Tan J, Liao X, Liu J, et al. Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng. 2021 Dec 31;9(2):888–903.
- Liao X, Yin J, Chen M, et al. Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput. 2020 Jun 24.
- Liao X, Yu Y, Li B, et al. A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol. 2019 Jan 31;30(3):685–696.
- Shah PD, Bichkar RS. A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International Conference on Intelligent Computing and Applications. Singapore: Springer; 2018. p. 119–129.
- Yadav GS, Ojha A. Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. Imaging Sci J. 2019 Apr 3;67(3):148–158.
- Hussein AK. Genetic algorithm based steganography using adaptive rectangular embedding area. Int J Mech Eng Technol. 2019;10(1):2066–2074.
- Georges J, Magdi DA. Using artificial intelligence approaches for image steganography: a review. In: Internet of things-applications and future. Springer; 2020 Apr 3. p. 239–247.
- Shah PD, Bichkar R. Genetic algorithm-based imperceptible image steganography technique with histogram distortion minimization. In: Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing; IEM-ICDC 2020; Vol. 62. Springer Nature; 2021. p. 267.
- Yang C-N, Hsu S-C, Kim C. Improving stego image quality in image interpolation based data hiding. Comput Stand Interfaces. 2017;50:209–215.
- Yadav GS, Ojha A. Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability. Appl Soft Comput. 2018 Dec 1;73:497–507.