1

Neil Johnson F., Sushil J., Steganography: Seeing the Unseen, IEEE Computer., 1998, 26–34. Google Scholar

2

Cheddad A., Condell J., Curran K., Mc Kevitt P., Digital image steganography – survey and analysis of current methods, J Signal Process., 2010, 90, 752–825. Google Scholar

3

Gonzalez R., Woods R.., Digital image processing., 2nd edition, Prentice Hall India, 2005. Google Scholar

4

Luo W., Huang F., Huang J., Edge Adaptive Image Steganography Based on LSB Matching Revisited, IEEE Transactions on Information Forensics and Security., 2010, 5, 201–214. Google Scholar

5

Bedi P., Bansal R., Sehgal P., Using PSO in a spatial domain based image hiding scheme with distortion tolerance, Computers and Electrical Engineering., 2013, 39, 640–654. Google Scholar

6

Chang C. C., Lin C. C., Tseng C. S., Tai W. L., Reversible hiding in DCT-based compressed images, Information Sciences., 2007, 177, 2768–2786. Google Scholar

7

Lin Y. K., High capacity reversible data hiding scheme based up on discrete cosine transformation, The Journal of Systems and Software., 2012, 85, 2395–2404. Google Scholar

8

Chan Y. K., Chen W. T., Yu S. S., Ho Y. A., Tsai C. S., Chu Y. P., A HDWT-based reversible data hiding method, The Journal of Systems and Software., 2009, 82, 411–421.Google Scholar

9

Yeh H. L., Gue S. T., Tsai P., Shih W. K., Wavelet bit-plane based data hiding for compressed images, International Journal of Electronics and Communication., 2013, 67, 808–815. Google Scholar

10

Subhedar M. S., Mankar V. H., Image steganography using redundant discrete wavelet transform and QR factorization, Computers and Electrical Engineering., 2016, 54, 406–422. Google Scholar

11

Jero E.S., Ramu P., Swaminathan R., Imperceptibility – Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization, Expert Systems With Applications., 2016, 49, 123–135. Google Scholar

12

Qu X., Yan J., Xie G., Zhu Z., Chen B., A novel image fusion algorithm based on bandelet transform, Chinese optics letters., 2007, 5, 569–572. Google Scholar

13

Do M. N., Vetterli M., The Finite Ridgelet Transform for Image Representation, IEEE Transactions on Image Processing., 2009, 1, 1–14 Google Scholar

14

Holland J. H., Adaptation in Natural and Arti7cial Systems, The University of Michigan Press, Ann Arbor, MI, 1975. Google Scholar

15

Goldberg D. E., Genetic Algorithms in Search, Optimization and Machine Learning, Addison-Wesley, Reading, MA, 1992. Google Scholar

16

Bajaj R., Bedi P., Pal S. K., Best hiding capacity scheme for variable length messages using particle swarm optimization, Proceedings of SEMCCO, LNCS., 2010, 6466, 237–244. Google Scholar

## Comments (0)

General note:By using the comment function on degruyter.com you agree to our Privacy Statement. A respectful treatment of one another is important to us. Therefore we would like to draw your attention to our House Rules.