[1] Joseli Mayer, Anderson Vieria Silveria Silverio, Jose Carlos M.
Bermudez, ―On the Design of Pattern Sequences for Spread
Spectrum Image Watermarking‖ International
Telecommunications Symposium- ITS 2002.
[2] Gary C. Kessler, An Overview of Steganography for the
Computer Forensics Examiner, Burlington, Vermont, June
2011.
[3] T. Morkel, J.H.P. Eloff, M.S. Olivier, An Overview Of Image
Steganography, Proceedings of the Fifth Annual Information
Security South Africa Conference(ISSA2005), Sandton, South
Africa, June/July 2005.
[4] A. Cheddad, J. Condell, ―Digital Image Steganography: Survey
and Analysis of Current Methods‖ Signal Processing, Vol.90,
Issue3, pp.727-752, 2010.
[5] Mrs. Kavitha, K. Kadam, ―Steganography Using Least
Signicant Bit Algorithm‖ Vol. 2, Issue 3, May-Jun 2012, pp.
338-341.
[6] Atallah M. Al-Shatnawi, ―A New Method in Image
Steganography with.
[7] Improved Image Quality‖ Applied Mathematical Sciences, Vol.
6, no. 79, pp. 3907 - 3915, 2012.
[8] E. Hussein, ― A Comparative Study of Digital Watermarking
Techniques in Frequency Domain‖ International Journal of
Computer Applications, Volume 52– No.20, pp.43-50, August
2012.
[9] G.L. Varco and W.Puech, ―DCT-based data hiding for securing
ROI of color image,‖ in proc. Of the IEEE International
Conference on Image Processing(ICIP), Genova,Italy,
vol.2,no.2,pp. 1086-1089, 2005.
[10] Avisha Khanna et al,"Lossless Compression based on Curvelet-
IWT" Int.J.Computer Technology & Applications,Vol 3 (1), pp.
431-436, feb. 2012.
[11] E. Candes, L. Demanet, D. Donoho , L.Ying, "Fast Discrete
Curvelet Transforms", Caltech, March 2006.
[12] P.Tao, S. Dexter, A. M. Eskicioglu, "Robust Digital Image
Watermarking in Curvelet Domain", Dept. of Computer
Science, Graduate Center & Brooklyn College, City University
of NewYork, 2006.
[13] L. Ying, L. Demanet and Emmanuel Cand`es, " 3D Discrete
Curvelet Transform", Applied and Computational Mathematics,
MC 217-50, Caltech, Pasadena, 2007.
[14] A. Mertins, " Wavelet, Filter Banks, Time Frequency
Transforms and Applications", translated by: Dr. M. H. Moradi,
Amir Kabir University, 2006. (in Persian)
[15] V. Natarajan, ―Blind Image Steganalysis Based on Contourlet
Transform‖ International Journal on Cryptography and
Information Security (IJCIS),Vol.2, No.3, September 2012.
[16] S. Masaebi, ―A New Approach for Image Hiding Based on
Contourlet Transform‖, International Journal of Electrical and
Computer Engineering (IJECE) Vol.2, No.5, pp. 699-708,
October 2012.
[17] P-P. Niu, et al, ―A novel color image watermarking scheme in
nonsampled contourlet-domain‖ ELSEVIER Expert Systems
with Applications38, pp.2081-2098, 2011.
[18] D. Liu, ―An Adaptive Watermarking Scheme Based on
Nonsubsampled Contourlet Transform for Color Image
Authentication‖ IEEE computer society, 2008.
[19] T. Bhattacharya, N. Dey, ―A Novel Session Based Dual
Steganographic Technique Using DWT and Spread Spectrum‖
International Journal of Modern Engineering Research
(IJMER), Vol.1, Issue1, pp.157-161, 2012.
[20] C. Xie, Y.Cheng, Y. Chen, ―Spread-Spectrum Steganalysis and
PN Sequence Estimation‖ IEEE 3rd International Congress on
Image and Signal Processing (CISP 2010), pp. 4143-4147,
2010.