A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevný, “Moving Steganography and Steganalysis from laboratory to Real World,” In Proceedings of the ACM IH&MMSec’13, ACM, pp.ACM 978-1-4503-2081-8/13/06, Montpellier, France, June 2013.
A. Bhatacharya, I. Banerjee, and G. Sanyal, “A survey of steganography and steganalysis techniques in image, text, audio and video cover carrier,” Journal of Global Research in Computer Science, vol. 2, no. 4, pp. 1-16, 2011.
I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography,” Morgan Kaufmann Publishers, San Francisco, Calif, USA, 2nd revised dition, 2007.
A. Cheddad, J. Condell, K. Curran, and P. Mckevitt, “Digital image steganography: Survey and analy sis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, March 2010.
A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” in Lecture Notes in Computer Science, 1768, Springer-Verlag, Berlin, pp. 61-75, 2000.
L. J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm,” Information Sciences, vol. 177, no. 15, pp. 3099-3109l, 2007.
A. Westfeld, “Detecting low embedding rates,” in 5th International Workshop on Information Hiding, Noordwijk erhout, The Netherlands, 2002.
K. Chin Chang, C. Ping Huang, S. Ping, and T. Te-Ming, “A novel image steganographic method using triway pixel-value differencing, “Journal of Multimedia, vol. 3, no. 2, pp. 37-44, June 2008.
H. Malekmohammadi and S. Ghaemmaghami, “Steganalysis of LSB Based Image Steganography Using Spatial And Frequency Domain Feature,” IEEE Trans., 2009.
H. Sajedi and M. Jamzad, “Selecting Steganography Method,” IEEE, 2010.
G. Cancelli and M. Barni, “MPSteg-color: data hiding through redundant basis decomposition,” Inf Forensics Secur, IEEE Trans, vol. 4, no. 3, pp. 346–358, 2009.
N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” Secur Privacy, IEEE Trans, vol. 1, no. 3, pp. 32–44, 2003.
A. Westfeld, “F5 a steganographic algorithm,” in Information hiding, pp. 289–302, 2001.
M. John Cioffi, “Digital Communication II: Coding,” Spring Quarter, 2005-2006.
M. khatirinejad, “Linear codes for high payload steganography, “IEEE Trans., Elsevier, 2009.
M. Carlos, “Hamming codes for wet paper steganography,” Springer Science Business, Media New York, 2015.
J. Fridrich, “Steganography in Digital Media,” IEEE Trans,
Binghamton University, State University of New York, 2008.
M. Morad, “Polar codes for secret sharing,” Department of Mathematics Amirkabir University of Technolog, IEEE Trans, arXiv: 1705.03042 v1 [cs.CR], May 2017.
J. Fridrich, “Efficient Wet Paper Codes,” IEEE Trans,
Binghamton University, State University of New York (SUNY), 2014.
W. Zhang, “Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes,” IEEE Trans, Zhengzhou 450002, China, 2009.
J. urgen Bierbrauer and J. Fridrich, “Constructing good covering codes for applications in Steganography,” IEEE Trans, Binghamton University, State University of New York, (NY) 13902-6000, 2015.
R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognit, vol. 34, no. 3, pp. 671–683, 2001.
A. D. Ker, “Improved detection of LSB steganography in grayscale images,” in Information Hiding, pp. 97–115, 2004.
J. Fridrich, P. Lisoněk, and D. Soukal, “On steganographic embedding efficiency,” in Computer Science, Alexandria, VA, pp. 282–296, July 2006.
M. Zolanvar, H. Ghanei Yakhdan, and A. M. Latif, “A New Method in Color Images Watermarking based on YPbPr Color Space in FWHT Domain,” Journal Of Electronical & Cyber Defence , vol. 4, no. 4, Serial No. 16, 2017. (in Persian)
A.Nourazar, "Images Steganography Based On Linear Codes and Provide an Method Optimal, " thesis Master of Science in Telecommunication Engineering Cipher and Security, Imam Hussein Comprehensive University, 2016 . (in Persian)