[1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T.Kalker, “Digital Watermarking and Steganography,” Second edn. Morgan Kaufmann, Burlington, 2007.##
[2] R. Bohem, “Advanced Statistical Steganalysis,” Springer-Verlag Berlin Heidelberg, 2010.##
[3] F. Cayre and P. Bas, “Kerckhoffs–based embedding security classes for WOA data hiding,” IEEE Transactions on Information Forensics and Security 3, pp. 1–15, 2008.##
[4] D. C. Wu and W. H. Tsai, “A Steganographic Method for Images by Pixelvalue Differencing,” Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2003.##
[5] X. Zhang and S.Wang, “Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security,” Pattern Recogn. Lett., vol. 25, no. 3, pp. 331–339, 2004.##
[6] C-H. Yang, C-Y. Weng, S-J. Wang, and H-M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 488–497, 2008.##
[7] L. Bin, He. Junhui, H. Jiwu, and Q. S. Yun, “A Survey on Image Steganography and Steganalysis,” Ubiquitous International Journal of Information Hiding and Multimedia Signal Processing, vol. 2, pp. 2073-4212, 2011.##
[8] J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.##
[9] W. Luo, F. Huang, and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 201–214, 2010.##
[10] F. Huang, Y. Zhong, and J.Huang, “Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm,” Springer-Verlag Berlin Heidelberg, pp. 19–31, 2014.##
[11] H. Al-Dmour and A. Al-Ani, “A Steganography Embedding Method Based on Edge Identification and XOR Coding,” Elsevier, Sience direct, vol. 46, pp. 293-306, 2016.##
[12] M. Ettinger, “Steganalysis and game equilibria,” In Aucsmith, D., ed.: Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 319– 328, 1998.##
[13] S. Pascal, L. Aron, J. Benjamin, G. Jens, and B. Rainer, “A game-theoretic analysis of content-adaptive steganography with independent embedding,” In EUSIPCO. IEEE, 2013.##
[14] S. Pascal and B. Rainer, “A game-theoretic approach to content-adaptive steganography,” In: Ghosal, D., Kirchner, M. (eds.) Information Hiding. LNCS, 2012.##
[15] J. Benjamin, S. Pascal, and B. Rainer, “ Where to hide the bits?,” In GameSec, vol. 7638 of LNCS, pp. 1–17, 2012.##
[16] T. Mekala and N. Mahendran, “Improved Security in Adaptive Steganography Using Game Theory,” vol.118, no. 8, pp. 111-116, 2018.##
[17] T. Pun, “A new method for gray-level picture thresholding using the entropy of the histogram,” Signal Processing, vol. 2, pp. 223-237, 1980.##
[18] GU. Guanghua, Yao Zhao, and Zhu Zhenfeng, “Integrated Image Representation Based Natural Scene Classification,” Elsevier, Expert Systems with Applications, vol. 38, pp. 11273–11279, 2011.##
[19] M. A. Shamalizadeh Baei, & et.al., “Designing an Image Steganography Algorithm Based on Entropy and ELSB2,” Advanced Defence Sci. & Tech., vol. 2, pp. 39-50, 2018. (In Persian)##