I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,” Second edition, Morgan Kaufmann, Burlington, 2007.
R. Bohem, “Advanced Statistical Steganalysis,” Springer-Verlag Berlin Heidelberg, 2010.
D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel value differencing,” Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2003.
S. Dumitrescu, X. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Trans. Signal Process., vol. 51, no. 7, pp. 1995–2007, 2003.
C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial
LSB domain systems,” IEEE Trans. Inf., Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.
L. Bin et al, “A Survey on Image Steganography and Steganalysis,” Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 2073-4212, 2011.
W.-J. Chen, C.-C. Chang, and T. Le, “High payload steganography mechanism using Hybrid edge detector,” Expert Systems with applications, vol. 4, pp. 3292–3301, 2010.
J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on LSB matching revisited,” IEEE Trans. Inf., Forensics Secur., vol. 5, no. 2, pp. 201-214, 2010.
F. Huang, Y. Zhong, and J. Huang, “Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm,” Springer-Verlag Berlin Heidelberg, pp. 19-31, 2014.
R. Crandall, “Some Notes on Steganography,” Posted on Steganography Mailing List, http://os.inf.tu-dresden.de/˜westfeld/crandall.pdf 297, 1998.
A. Westfeld, “High capacity despite better steganalysis (F5 - a steganographic algorithm),” in Proc. 4th Int. Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 289-302, 2001.
H. Al-Dmour and A. Al-Ani, “A steganography embedding method based on edge identification and XOR coding,” Expert Systems With Applications, vol. 46, pp. 293-306, 2016.
G. Guanghua, Y. Zhao, and Z. Zhenfeng, “Integrated image representation based natural scene classification,” Expert Systems with Applications, vol. 38, pp. 11273-11279, 2011.
K. Thulasiraman and M. N. S. Swamy, “Graphs Theory and Algorithms. Wiley-Interscience,” 1992.
F. Malmberg, “Graph Based Method for Interactive Image Segmentation,” Digital Comprehensive Summarise of Uppsala Dissertations from the Faculty of science and Technology 813, pp. 51-59, 2011.
N. Rashevsky, “Life, information theory and topology,” Bull. Math. Biophys, vol. 17, pp. 229-235, 1955.
E. Trucco, “A note on the information content of graphs,” Bulletin of Mathematical Biology,” vol. 18, no. 2, pp. 129-135, 1956.
A. Mowshowitz, “Entropy and the complexity of the graphs I,” an index of the relative complexity of a graph, Bulletin of Mathematical Biophysics 30, pp. 175-204, 1968.
A. Mowshowitz, “Entropy and the complexity of graphs II: the information content of digraphs and infinite graphs,” Bulletin of Mathematical Biophysics 30, pp. 225-240, 1968.
A. Mowshowitz, “Entropy and the complexity of graphs III: graphs with prescribed information content,” Bulletin of Mathematical Biophysics 30, pp. 387-414, 1968.
A. Mowshowitz, “Entropy and the complexity of graphs IV: entropy measures and graphical structure,” Bulletin
J. Körner, “Coding of an information source having ambiguous alphabet and the entropy of graphs,” in: Transactions of the Sixth Prague Conference on Information Theory, pp. 411-425, 1973.
Z. Chen, M. Dehmer, and Y. Shi, “A Note on Distance-based Graph Entropies,” Journal of Entropy, vol. 16, pp. 5416-5427, 2014.
K. Solanki, A. Sarkar, and B. S. Manjunath, “YASS: Yet another Steganographic Scheme That Resists Blind Steganalysis,” in Proc. 9th Int. Workshop on Information Hiding, Saint Malo, Brittany, pp. 16-31, 2007.