Z. Safari Neshat, “Steganalysis of JPEG Image Format,” Maleke Ashtar University, 2013 (In Persian).
S. S. Jaber and H. A. Fadhil, “Survey On Recent Digital Image Steganography Techniques,” School of Computer and Communication Engineering, University Malaysia Perlis, 2014.
C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences 141, 2002.
X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences 177, 2007.
H. Malekmohammadi and S. Ghaemmaghami, “Steganalysis of LSB Based Image Steganography Using Spatial and Frequency Domain Feature,” IEEE, 2009.
Andreas Westfeld, “F5-A Steganographic Algorithm High Capacity Despite Better Steganalysis,” Institute for System Architecture, Dresden, Germany, Springer-Verlag Berlin Heidelberg, 2001.
K. Solanki, A. Sarkar, and B. S. Manjunath, “ YASS: Yet another steganographic scheme that resists blind steganalysis,” in Proc. 9th International Information Hiding Workshop, Lecture Notes in Computer Science, vol. 4567, pp. 16-31, 2007.
M. Dabgar and P. Muliya, “Resisting Blind Steganalysis in Real Time Covert Communication,” International Journal of Computer Applications (0975 – 8887), vol. 120, no. 9, June 2015.
X. Qi and K. Wong, “An adaptive DCT-based mod-4 steganographic method,” in: IEEE Proceedings of ICIP, vol. II, Sep. 2005.
K. Wong, X. Qi, and K. Tanaka, “A DCT-based Mod4 Steganographic Method,” Signal Processing 87, pp. 1251–1263, 2007.
K. Wong, K. Tanaka1, and X. Jun, “Multiple Messages Embedding Using DCT-Based Mod4 Steganographic Method,” Springer-Verlag Berlin Heidelberg, 2006.
K. Chakraborty, G. Sanyal, and A. Kundu, “Audio Steganography Using Mod4 Method,” Journal of Computing, vol. 3, ISSUE 8, ISSN 2151-9617, August 2011.
P. Suresh and S. Anathan, “Image steganography using mod4 embedding algorithm based on image contrast,” International Journal of Current Research, vol. 33, Issue 6, pp. 134-138, June 2011.