[1] H. J. Highland, “Data encryption: A non-mathematical approach,” Comput. Secur., 1997.##
[2] R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Sel. Areas Commun., 1998.##
[3] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hidinga survey,” Issue prot. multimedia content, 1998.##
[4] D. W. Bender, N. M. Gruhl, and A. Lu, “Techniques for data hiding,” IBM syst. J., 1998.##
[5] H. Wang and S. Wang, “Cyber warfare Steganography vs. Steganalysis,” commun. ACM., 1998.##
[6] R. O. Eason and E. Kawaguchi, “Principle and applications of bpcs,” Steganography In proceedings of SPIE, 1998.##
[7] I.C. Lin, Y. B. Lin, and C. M. Wang, “Hiding data in spatial domain images with distortion tolerance,” Comput. Stand. Inter., 2003.##
[8] C. K. Chan and L. M. Chen, “Hiding data in images by simple LSB substitution,” Pattern recognit., 2004.##
[9] D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,” Pattern recognit. Lett., 2004.##
[10] C. C. Chang and H. W. Tseng, “A steganographic method for digital images using side match,” Pattern recognit. Lett., 2004.##
[11] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Proc. Inst. Elect. Eng., Vis. Images signal process, 2005.##
[12] Y. R. Park, H. H. Kang, S. U. Shin, and K. R. Kwon, “A steganographic scheme in digital images using information of neighboring pixels,” vol. 3612, Springer-verlag,Berlin, Germany, 2005.##
[13] C. H. Yang and C. Y. Weng, “A steganographic method for digital images by multi-pixel differencing,” Proceedings of international computer symposium, Taipei, 2006.##
[14] K. H. Jung, K. J. Ha, and K. Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB substitution methods,” International conference on convergence and hybrid information technology, 2008.##
[15] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “A high quality steganography method with pixel-value differencing and modulus function,” J. Syst. Softw., 2008.##
[16] C. H. Yang, C. Y. Weng, S. J. Wang, and H. M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Secur. 2008.##
[17] X. Liaoa, Q.-Y. Wen, and J. Zhang, “A steganographic method for digital images with four-pixel differencing and modified LSB substitution,” ELSEVIER, 2011.##
[18] M. Sabokdast and M. Mohammadi, “A steganographic method for images with modulus function and modified LSB replacement based on PVD,” 5th Conference on information and knowledge technology, IEEE, 2013.##
[19] C.-H. Yang, C.-Y .Weng, and S.-J. Wang, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Ttransations on information forensics and security, 2008.##
[20] B. Kaur, A. Kaur, and J. Singh, “Steganography approach for hiding image in DCT domain,” International journal of Advances in engineering & technology, 2011.##
[21] X. Song, S. Wang, and X. Niu, “An integer DCT and affine transformation based image steganography method,” Eighth international conference on intelligent information hiding and multimedia signal processing, 2012.##
[22] Tamanna and A. Sethi, “Steganography a juxtaposition between LSB DCT, DWT,” International journal of computer applications, 2015.##
[23] A. Goswami and S. Khandelwal, “Coloured and gray scale image steganography using block level DWT, DCT transformation,” International journal of computer applications, 2016.##
[24] A. Nourazar, Z. Noroozi, and M. Mir, “An Optimal Method for Images Steganography Based on Linear Codes Features,” Journal of Electronical& Cyber Defence, 2017. (in Persian)##
[25] G. Swain, “Very high capacity image steganography technique using quotient value differencing and LSB substitution,” Arabian journal for science and engineering, 2018.##