[1]
K. B. Raja, C. R. Chowdary, Venugopal K R, L. M. Patnaik, A Secure Image Steganography using LSB, DCT, and Compression Techniques on Raw Images, , IEEE 0-7803-9588-3/05, March (2005).
DOI: 10.1109/icisip.2005.1619431
Google Scholar
[2]
Lisa M. Marvel and Charles T. Retter, A Methodology for Data Hiding Using Images, IEEE 0-7803-4506-1/98, (1998).
Google Scholar
[3]
G. Doerr and J.L. Dugelay, A Guide Tour of Video Watermarking, In Signal Processing: Image Communication, vol. 18, Issue 4, pp.263-282, (2003).
DOI: 10.1016/s0923-5965(02)00144-3
Google Scholar
[4]
G. Do¨err and J.L. Dugelay, Security Pitfalls of Frameby-Frame Approaches to Video Watermarking, Trans. Signal Processing, Supplement on Secure Media, IEEE, vol. 52, Issue 10, pp.2955-2964, (2004).
DOI: 10.1109/tsp.2004.833867
Google Scholar
[5]
Pramath Nath Basu and Tanmay Bhowmik, On Embedding of Text in Audio- A case of Steganography, International conference on Recent Trends in Information, Telecommunication and computing, (2010).
DOI: 10.1109/itc.2010.16
Google Scholar
[6]
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems Journal, vol. 35, issues 3&4, 1996, pp.313-336.
DOI: 10.1147/sj.353.0313
Google Scholar
[7]
S.H. Low, N.F. Maxemchuk, J.T. Brassil and L. O'Gorman, Document marking and identification using both line and word shifting", Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM , 95), 2-6 April 1995, vol. 2, pp.853-860.
DOI: 10.1109/infcom.1995.515956
Google Scholar
[8]
Kalavathi Alla and R. Siva Rama Prasad, An Evolution of Hindi Text Steganography, 6th ITNG 2009, proceedings of the Conference in IEEE computer Socienty digital library, 1577- 1579. doi. ieee. copmutersociety. org/10. 1109.
Google Scholar
[9]
Nedeljko Cvejic, Tapio Seppanen. Increasing the capactity of LSB-based audio steganography [J]. inProc. IEEE International Workshop on Multimedia Signal Processing, St. Thomas, VI, December 2002, pp.336-338.
DOI: 10.1109/mmsp.2002.1203314
Google Scholar
[10]
Yin Xiong and Zhang Xiao ming, Covert Communication Audio Watermarking Algorithm Based on LSB", IEEE Conferences Communication Technology, 2006. ICCT , 06, 2006 , p.1 – 4.
DOI: 10.1109/icct.2006.341972
Google Scholar
[11]
Pramatha Nath Basu and Tanmay Bhowmik, "On Embedding of Text in Audio – A case of Steganography, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, P. 203-206, IEEE 2010, DOI 10. 1109/ITC. 2010. 16.
DOI: 10.1109/itc.2010.16
Google Scholar
[12]
Mazdak Zamani, Azizah Bt Abdul Manaf and Rabiah Bt Ahmad, A Novel Approach for Audio Watermarking, 2009 Fifth International Conference on Information Assurance and Security, pp.83-86 (2009).
DOI: 10.1109/ias.2009.22
Google Scholar
[13]
Masahiro Wakiyama, Yasunobu Hidaka and Koichi Nozaki, An audio steganography by a low-bit coding method with wave files, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, P. 530-533 IEEE2010, DOI 1109/IIHMSP. 2010. 135.
DOI: 10.1109/iihmsp.2010.135
Google Scholar
[14]
Pradeep Kumar Singh and R.K. Aggrawal, Enhancement of LSB based Steganography for Hiding Image in Audio, International Journal on Computer Science and Engineering, Vol. 02, No. 05, 2010, 1652-1658.
Google Scholar
[15]
Ravindranath C. Cherukuri, Sos S. Agaian, and Chinni. V. C. Atluri, Key Dependent Covert Communication System for Audio Signals, 2007 IEEE International Conference on Systems, Man, and Cybernetics, 7-10 October, 2007, ISBN 1-4244-0991-8/07, p.2050-(2055).
DOI: 10.1109/icsmc.2007.4413748
Google Scholar
[16]
Wei Cao, Yixin Yan and Shengming Li, Bit Replacement Audio Watermarking Using Stereo Signals, 2009 International Conference on New Trends in Information and Service Science, pp.603-606, 2009 IEEE, DOI 10. 1109/NISS. 2009. 234.
DOI: 10.1109/niss.2009.234
Google Scholar
[17]
Sameer Mitra and Sathiamoorthy Manoharan, Experiments with and Enhancements to Echo Hiding, 2009 Fourth International Conference on Systems and Networks Communications, pp.119-124, 2009 IEEE, DOI 10. 1109/ICSNC. 2009. 76.
DOI: 10.1109/icsnc.2009.76
Google Scholar
[18]
G. J Simmons, Prisoner's Problem and the Subliminal Channel (The), CRYPTO83 – Advances in Cryptology, pp.51-67, (1984).
Google Scholar