Steganography-Time to Time: A Review

[1]  Rengarajan Amirtharaj,et al.  Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .

[2]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[3]  Wojciech Mazurczyk,et al.  Hiding information in a Stream Control Transmission Protocol , 2011, Comput. Commun..

[4]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[5]  Zarinah Mohd Kasirun,et al.  Hiding Data in Video File: An Overview , 2010 .

[6]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[7]  Yuting Su,et al.  Video steganalysis based on aliasing detection , 2008 .

[8]  Guo-Shiang Lin,et al.  A feature-based classification technique for blind image steganalysis , 2005, IEEE Transactions on Multimedia.

[9]  John Bosco Balaguru Rayappan,et al.  Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .

[10]  Xingming Sun,et al.  A Secure Steganographic Method via Multiple Choice Questions , 2011 .

[11]  Azizah Abdul Manaf,et al.  High watermarking capacity based on spatial domain technique , 2011 .

[12]  Yong Zhang,et al.  A Blind Image Watermarking Scheme Using Fast Hadamard Transform , 2010 .

[13]  Juan Li,et al.  A Huffman Coding Section-based Steganography for AAC Audio , 2011 .

[14]  Nasir D. Memon,et al.  Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..

[15]  Othman Omran Khalifa,et al.  A review on multimedia communications cryptography , 2011 .

[16]  Jiaohua Qin,et al.  A Review on Detection of LSB Matching Steganography , 2010 .

[17]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[18]  K. Thenmozhi,et al.  Firmware for Data Security: A Review , 2012 .

[19]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[20]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[21]  B. B. Zaidan,et al.  Secure Topology for Electronic Medical Record Transmissions , 2010 .

[22]  Rengarajan Amirtharaj,et al.  Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .

[23]  Ismail Avcibas Audio steganalysis with content-independent distortion measures , 2006, IEEE Signal Processing Letters.

[24]  Xingming Sun,et al.  Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection , 2008 .

[25]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[26]  Moayad A. Fadhil,et al.  Arabic Text Steganography using Kashida Extensions with Huffman Code , 2010 .

[27]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .

[28]  Sajad Shirali-Shahreza,et al.  High Capacity Persian/Arabic Text Steganography , 2008 .

[29]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[30]  Tung-Shou Chen,et al.  Blockwise Reversible Data Hiding by Contrast Mapping , 2009 .

[31]  K. Thenmozhi,et al.  Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .

[32]  Dongqing Xie,et al.  A High-capacity Steganographic Scheme for 3D Point Cloud Models , 2010 .

[33]  Tuomas Aura,et al.  Practical Invisibility in Digital Communication , 1996, Information Hiding.

[34]  Miss Laiha Mat Kiah Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .

[35]  Walter Bender,et al.  Applications for data hiding , 2000, IBM Syst. J..

[36]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[37]  Rengarajan Amirtharajan,et al.  Constructive Role of SFC & RGB Fusion versus Destructive Intrusion , 2010 .

[38]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[39]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[40]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[41]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[42]  Dengguo Feng,et al.  Video Steganalysis Exploiting Motion Vector Reversion-Based Features , 2012, IEEE Signal Processing Letters.

[43]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[44]  Zhihua Xia,et al.  Steganalysis Based on Difference Statistics for LSB Matching Steganography , 2009 .

[45]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[46]  Jessica J. Fridrich,et al.  New blind steganalysis and its implications , 2006, Electronic Imaging.

[47]  Xingming Sun,et al.  Steganography in Ms Excel Document using Text-rotation Technique , 2011 .

[48]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[49]  Zhihua Xia,et al.  Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm , 2009 .

[50]  Xingming Sun,et al.  An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .

[51]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[52]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[53]  Hao Luo,et al.  Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .

[54]  Subariah Ibrahim,et al.  Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .

[55]  Hao Luo,et al.  Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .

[56]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[57]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .