auto; -webkit-text-stroke-width: 0px; [1] Z. Y. Al-Omari and A. T. Al-Taani, “Secure LSB steganography for
colored images using character-color mapping”, The 8th International
Conference on Information and Communication Systems (ICICS), IEEE,
Jordan, 2017.
[2] S. Sugathan, “An improved LSB embedding technique for image
steganography”, The 2nd International Conference on Applied and
Theoretical Computing and Communication Technology (iCATccT),
IEEE, India, 2017.
[3] A. Arora, M. P. Singh, P. Thakral and N. Jarwal, “Image steganography
using enhanced LSB substitution technique”, The 4th International
Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE,
India, 2016.
[4] S. Kaur, S. Bansal and R. K. Bansal, “Steganography and Classification of
Image Steganography Techniques”, International Conference on
Computing for Sustainable Global Development (INDIACom), IEEE,
India, 2014.
[5] V. Thanikaiselvan and P. Arulmozhivarman, “High Security Image
Steganography Using IWT and Graph Theory”, International Conference
on Signal and Image Processing Applications (lCSIPA), IEEE, Malaysia,
2013.
[6] W-N Lie and G-S Lin, “A feature-based classification technique for blind
image steganalysis”, IEEE Transactions on Multimedia, Vol.7, No.6,
pp.1007-1020, November 2005.
[7] D. S. Warkari and U. A. Kshirsagar, “FPGA Implementation of Point
Processing Operation using Hardware Simulation”, International Journal
of Advanced Research in Computer and Communication Engineering
Vol.4, No.4, pp.91-95, April 2015.
[8] M. Alareqi, R. Elgouri, M. Tarhda, K. Mateur, A. Zemmouri, A. Mezouari
and L. Hlou, “Design and FPGA implementation of Real-Time Hardware
Co-Simulation for image enhancement in biomedical applications”,
International Conference on Wireless Technologies, Embedded and
Intelligent Systems (WITS), IEEE, Morocco, 2017.
[9] V. Dhaka, R. C. Poonia and Y. V. Singh, “A Novel Algorithm for Image
Steganography Based on Effective Channel Selection Technique”,
International Journal of Advanced Research in Computer Science and
Software Engineering (IJARCSSE), Vol.3, No.8, pp.428-433, August 2013.
[10] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method with
Adaptive Number of Least Significant Bits Modification Based on Private
Stego-Keys”, International Journal of Computer Science and Security,
Vol.4, No.1, pp.40-49, 2010.
webkit-text-size-adjust: auto; -webkit[11] C. Yang, F. Liu, X. Luo and Y. Zeng, “Pixel Group Trace Model-Based
Quantitative Steganalysis for Multiple Least-Significant Bits
Steganography”, IEEE Transactions on Information Forensics and
Security, Vol.8, No.1, pp.216-228, January 2013.
[12] R. Joshci, L. Gagnani and S. Pandey, “Image Steganography With LSB”,
International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET), Vol.2, No.1, pp.228-229, January 2013.
[13] S. Deepa and R. Umarani, “A Study on Digital Image Steganography”,
International Journal of Advanced Research in Computer Science and
Software Engineering, Vol.3, No.1, pp.54-57, January 2013.
[14] S. S. Kumar and M. Archana, “Digital Image Steganography Techniques:
Case Study”, International Journal of Research in Engineering &
Advanced Technology (IJREAT), Vol.2, No.2, pp.1-7, April-May 2014.
[15] T. Vanitha, A. D. Souza, B. Rashmi and S. Dsouza, “A Review on
Steganography – Least Significant Bit Algorithm and Discrete Wavelet
Transform Algorithm”, International Journal of Innovative Research in
Computer and Communication Engineering (IJIRCCE), Vol.2, Special
Issue 5, pp.89-95, October 2014.
[16] S. A. Christe M. Vignesh and A. Kandaswamy, “An Efficient FPGA
Implementation of MRI Image Filtering and Tumour Characterization
Using Xilinx System Generator”, International Journal of VLSI design &
Communication Systems (VLSICS) Vol. 2. No. 4, pp.95–109, 2011.
[17] C. Sujatha and D. Selvathi, “Hardware Implementation of Image Edge
Detection Using Xilinx System Generator”, Asian journal of scientific
research, pp.1–11, 2014.
[18] K. A. Dakre and P. N. Pusdekar, “Image Enhancement using Hardware
co-simulation for Biomedical Applications”, International Journal on
Recent and Innovation Trends in Computing and Communication
(IJRITCC), Vol. 3, No. 2, pp.869–877, 2015.
[19] G. Chawla, Kamaldeep, R. Yadav and S. Ravi, “Analysis of Various Image
Steganography Techniques on the Basis of Normalized Cross - Correlation
(NCC)”, International Journal of Advanced and Innovative Research
(IJAIR), Vol.1, No.2, July 2012.
[20] Ö. ÇATALTA and K. TÜTÜNCÜ, “Comparison of LSB Image
Steganography Technique in Different Color Spaces”, International
Artificial Intelligence and Data Processing Symposium (IDAP), IEEE,
Malatya, Turkey, 16-17 Sep. 2017.
[21] M. Juneja and P. S. Sandhu, “An Improved LSB based Steganography
Technique for RGB Color Images”, Second International Conference on
Latest Computational Technologies (ICLCT-2013), pp.10–14, London,
UK, 17–18 June 2013.
[22] S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, “Enhancing security of
images by Steganography and Cryptography techniques”, The Sixth