[1] I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research,” Neurocomputing, Vol. 335, pp. 299-326, 2019.
[2] M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, “Image Steganography in Spatial Domain: A Survey,” Signal Processing: Image Communication, Vol. 65, pp. 46-66, 2018.
[3] V. Sabeti, S. Samavi and S. Shirani, “An Adaptive LSB Matching Steganography Based on Octonary Complexity Measure,” Multimedia Tools and Applications, Vol. 64, No. 3, pp.777-793, 2013.
[4] S. Bhattacharyya, A. Khan and G. Sanyal, “DCT Difference Modulation (DCTDM) Image Steganography,” International Journal of Information & Network Security, Vol. 3, No. 1, pp. 40 – 63, 2014.
[5] A. Fkirin, G. Attiya and A. El-Sayed, “Steganography Literature Survey, Classification and Comparative Study,” Communications on Applied Electronics, Vol. 5, No. 10, 2016.
[6] J. Jeswani and D.T. Sarode, “A New DCT based Color Video Watermarking using Luminance Component,” IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, No. 2, pp. 83–90, 2014.
[7] M. Kharrazi, H.T. Sencar and N. Memon, “Image Steganography: Concepts and Practice,” Lecture Note Series, Institute for Mathematical Sciences, National University of Singapore, 2004.
[8] N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography,” IEEE Security & Privacy, Vol. 1, No. 3, pp. 32-44, 2003.
[9] N. Provos, “Defending Against Statistical Steganalysis”. In Usenix security symposium, Vol. 10, pp. 323-336, 2001.
[10] A. Westfeld, “F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis”. In Information Hiding: 4th International Workshop, Vol. 2137, pp. 289, 2001.
[11] J. Fridrich, M. Goljan and D. Hogea, “Attacking the OutGuess”. In Proceedings of the ACM Workshop on Multimedia and Security, Vol. 2002, 2002.
[12] J. Fridrich, M. Goljan and D. Holga, “Steganalysis of JPEG Images: Breaking the F5 Algorithm”. In International Workshop on Information Hiding, pp. 310-323, 2003.
[13] A.A. Attaby, F.M. Mona, M. Ahmed and A. Alsammak, “Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3,” Ain Shams Engineering Journal, 2017.
[14]
T. Filler, J. Judas and
J. Fridrich, “Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes,” IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 920-935, 2011.
[15] Y. Pan, J. Ni and W. Su, “Improved Uniform Embedding for Efficient JPEG Steganography”. In International Conference on Cloud Computing and Security, pp. 125-133, 2016.
[16] Q. Wei, Z. Yin, Z. Wang and X. Zhang, “Distortion Function Based on Residual Blocks for JPEG Steganography,” Multimedia Tools and Applications, Vol. 77, No. 14, pp. 17875-17888, 2018.
[17] D.C. Wu and W.H. Tsai, “A Steganographic Method for Images by Pixel-Value Differencing,” Pattern Recognition Letters, Vol. 24, pp. 1613–1626, 2003.
[18] L. Yu, Y. Zhao, R. Ni and Z. Zhu, “PM1 Steganography in JPEG Images Using Genetic Algorithm,”
Soft Computing, Vol. 13,
No. 4, pp. 393–400, 2009.
[19] D. Bansal and R. Chhikara, “An Improved DCT Based Steganography Technique,” International Journal of Computer Applications, Vol. 102, No. 14, 2014.
[20] T. Rabie and I. Kamel, “High-Capacity Steganography: A Global-Adaptive-Region Discrete Cosine Transform Approach,” Multimedia Tools and Applications, Vol. 76, No. 5, pp. 6473-6493, 2017.
[21] A.S. Ansari, M.S. Mohammadi, and M.T. Parvez, “JPEG Image Steganography based on Coefficients Selection and Partition,” International Journal of Image, Graphics & Signal Processing, Vol. 9, No.6, pp. 14-22, 2017.
[22] S. Khan, M.A. Irfan, A. Arif, S.T.H. Rizvi, A. Gul, M. Naeem and N. Ahmad, “On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography,” CMES-Computer Modeling in Engineering & Sciences, Vol. 118, No. 3, pp. 529-546, 2019.
[23] E.H. Rachmawanto and C.A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” Journal of Applied Intelligent System,Vol. 2, No. 1, pp. 1-11, 2017.
[25] D. Hou, H. Wang, W. Zhang and N. Yu, “Reversible Data Hiding in JPEG Image Based on DCT Frequency and Block Selection,”
Signal Processing, Vol. 148, pp.41-47, 2018.
[26] F.
Huang, X.
Qu, H.J. Kim and J.
Huang, “Reversible Data Hiding in JPEG Images,” IEEE Transactions on Circuits and Systems for Video Technology,
Vol. 26, No. 9, pp. 1610-1621, 2015.
[27] T. Pevny, P. Bas and J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, pp. 215-224, 2010.