A New Steganography Algorithm against Chi Square Attack

[1]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[2]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[3]  Rengarajan Amirtharaj,et al.  Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .

[4]  John Bosco Balaguru Rayappan,et al.  Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .

[5]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[6]  Zarinah Mohd Kasirun,et al.  Hiding Data in Video File: An Overview , 2010 .

[7]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[8]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[9]  Juan Li,et al.  A Huffman Coding Section-based Steganography for AAC Audio , 2011 .

[10]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[11]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[12]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[13]  Subariah Ibrahim,et al.  Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .

[14]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .