[1]
|
N. Nameer and E. Eman, “Hiding a large amount of data with high security using steganography algorithm,” Journal of Computer Sciences, pp. 223-232, April 2007.
|
[2]
|
P. K. Amin, N. Liu, and K. P. Subbalakshmi, “Statistically secure digital image data hiding,” Multimedia Signal Processing, IEEE 7th Workshop, Shanghai, pp. 1-4, October 2005.
|
[3]
|
R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” International Conference on Image Processing, Thessaloniki, Greece, pp. 1019-1022, 2001.
|
[4]
|
S. Dumitrescu, X. L. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Transactions on Signal Processing, Vol. 51, No. 7, pp. 1995-2007, July 2003.
|
[5]
|
B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Transac-tion on Information Theory, Vol. 47, pp. 1423-1443, 2001.
|
[6]
|
P. Moulin and J. A. O’Sullivan, “Information-theoretic analysis of information hiding,” IEEE International Symposium on Information Theory, Sorrento, Italy, pp. 19, June 2000.
|
[7]
|
P. Moulin and M. K. M?hcak, “A framework for evaluating the data-hiding capacity of image sources,” IEEE Transaction on Image Processing, Vol. 11, pp. 1029- 1042, September 2002.
|
[8]
|
C. Y. Lin and S. F. Chang, “A robust image authentication
method surviving JPEG lossy compression,” SPIE, pp. 296-307, 1998.
|
[9]
|
S. Pavan, G. Sridhar, and V. Sridhar, “Multivariate entropy detector based hybrid image registration,” IEEE ICASSP, Vol. 2, pp. 873-876, March 18-23, 2005.
|
[10]
|
H. H. Pang, K. L. Tan, and X. Zhou, “Steganographic schemes for file system and B-tree,” IEEE Transaction on Knowledge and Data Engineering, Vol. 16, No. 6, pp. 701-713, June 2004.
|
[11]
|
http://www.spychecker.com/download/download_stools.html, visited as on March 28, 2009
|