[1] | John Shrewd, “A computational way to deal with edge identification”, IEEE Exchanges on pattern analysis and Machine Intelligence, Vol. 8, No. 6, pp.679-698, Nov. 198. |
|
[2] | Ron Crandall, “Some Notes on Steganography”, Posted on Steganography Mailing List, 1998. Source: http://www.dia.unisa.it/~ads/corsosecurity/ www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf |
|
[3] | Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214. |
|
[4] | Grant Kelly, Bruce McKenzie, “Security, privacy and confidentiality issues on the internet”, Source: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1761937. |
|
[5] | C.V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze, “Protecting Intellectual Rights: Digital Watermarking in the wavelet domain”, IEEE Int. Workshop Trends and Recent Achievements in IT, pp. 16-18, 2002. |
|
[6] | Ratnakirti Roya,*, Anirban Sarkara, Suvamoy Changdera, “Chaos based Edge Adaptive Image Steganography”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA) 2013. |
|
[7] | Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang , “A Spatial Domain Color Watermarking Scheme based on Chaos”, International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008. |
|
[8] | X. Li, B. Yang, D. Cheng, and T. Zeng, “A generalization of lsb matching”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, 2009. |
|
[9] | R. L. Tataru, D. Battikh, S. El Assad, H. Noura, O. Deforges, “Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic Sequences”, Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 85-88, 2012. |
|
[10] | Sahar Mazloom, Amir-Masud Eftekhari-Moghadam, “Color Image Cryptosystem using Chaotic Maps”, IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing, pp. 142-147, 2011. |
|
[11] | Chen Wei-bin, Zhang Xin, “Image Encryption Algorithm based on Henon Chaotic System”, International Conference on Image Analysis and Signal Processing (IASP), pp. 94-97, 2009. |
|