xt-stroke-width: 0px; "> [1] S. Deepa and R. Umarani, "A Study on Digital Image Steganography",
International Journal of Advanced Research in Computer Science and
Software Engineering (IJARCSSE), Vol. 3, Issue 1, pp. 54 – 57, January
2013.
[2] H. Al-Bahadili, "A Secure Block Permutation Image Steganography
Algorithm", International Journal on Cryptography and Information
Security (IJCIS), Vol. 3, No. 3, pp. 11 – 22, September 2013.
[3] K. D. Megha, N. P. Vaidya and K. Patel, "Digital Watermarking: Data
Hiding Techniques using DCT-DWT Algorithm", International Journal of
Advanced Research in Computer and Communication Engineering
(IJARCCE), Vol. 2, Issue 6, pp. 2397 – 2402, June 2013.
[4] G. Kaur and K. Kaur, "Digital Watermarking and Other Data Hiding
Techniques", International Journal of Innovative Technology and
Exploring Engineering (IJITEE), Vol. 2, Issue 5, pp. 181 – 184, April
2013.
[5] K. Challita and H. Farhat, "Combining Steganography and Cryptography:
New Directions", International Journal on New Computer Architectures
and Their Applications (IJNCAA), Vol. 1 Issue 1, pp. 199 – 208, 2011.
[6] O. C. Abikoye, K. S. Adewole and A. J. Oladipupo, "Efficient Data Hiding
System using Cryptography and Steganography", International Journal of
Applied Information Systems (IJAIS), Volume 4, No. 11, pp. 6 – 11,
December 2012.
[7] M. K. I. Rahmani, K. Arora and N. Pal, "A Crypto-Steganography: A
Survey", International Journal of Advanced Computer Science and
Applications (IJACSA), Vol. 5, No. 7, pp. 149 – 155, 2014.
[8] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, "Digital Image
Steganography: Survey and Analysis of Current Methods", Signal
Processing, Elsevier, Vol. 90, Issue 3, pp. 727 – 752, March 2010.
[9] M. Juneja and P. S. Sandhu, "Data Hiding with Enhanced LSB
Steganography and Cryptography for RGB Color Images", International
Journal of Applied Research, Vol. 3, No. 5, pp. 118 – 120, May 2013.
[10] C. P. Sumathi, T. Santanam and G. Umamaheswari, "A Study of Various
Steganographic Techniques Used for Information Hiding", International
Journal of Computer Science & Engineering Survey (IJCSES), Vol. 4, No.
6, pp. 9 – 25, December 2013.
[11] J. Kour and D. Verma, "Steganography Techniques –A Review Paper",
International Journal of Emerging Research in Management &
Technology, Vol. 3, Issue 5, pp. 132 – 135, May 2014.
[12] F. M. Shelke, A. A. Dongre and P. D. Soni, "Comparison of Different
Techniques for Steganography in Images", International Journal of -stroke-width: 0px; "> Application or Innovation in Engineering & Management (IJAIEM), Vol.
3, Issue 2, pp. 171 – 176, February 2014.
[13] M. Umamaheswari, S. Sivasubramanian and S. Pandiarajan, "Analysis of
Different Steganographic Algorithms for Secured Data Hiding",
International Journal of Computer Science and Network Security
(IJCSNS), Vol. 10, No. 8, pp. 154 – 160, August 2010.
[14] R. G. Bal and P. Ezhilarasu, "An Efficient Safe and Secured Video
Steganography Using Shadow Derivation", International Journal of
Innovative Research in Computer and Communication Engineering
(IJIRCCE), Vol. 2, Issue 3, pp. 3251 – 3258, March 2014.
[15] A. Chadha, N. Satam, R. Sood and D. Bade, "An Efficient Method for
Image and Audio Steganography using Least Significant Bit (LSB)
Substitution", International Journal of Computer Applications (IJCA), Vol.
77, No. 13, pp. 37 – 45, September 2013.
[16] M. Nosrati, R. Karimi and M. Hariri, "An Introduction to Steganography
Methods", World Applied Programming, Vol. 1, No. 3, pp. 191 – 195,
August 2011.
[17] T. Handel and M. Sandford, "Hiding Data in the OSI Network Model",
Proceedings of the 1st International Workshop on Information Hiding, pp.
23 – 38, June 1996.
[18] M. Hussain and M. Hussain, "A Survey of Image Steganography
Techniques", International Journal of Advanced Science and Technology,
Vol. 54, pp. 113 – 124, May 2013.
[19] E. Dagar and S. Dagar, "Comparative Study of Various Steganography
Techniques", International Journal of Emerging Engineering Research and
Technology (IJEERT), Vol. 2, Issue 2, pp. 30 – 36, May 2014.
[20] S. Singh and T. J. Siddiqui, "A Security Enhanced Robust Steganography
Algorithm for Data Hiding", International Journal of Computer Science
Issues (IJCSI), Vol. 9, Issue 3, No. 1, pp. 131- 139, May 2012.
[21] A. A. El-Zoghabi, A. H. Yassin and H. H. Hussien, "Public Key
Steganography using LSB Method with Chaotic Neural Network",
International Journal of Computer Engineering and Technology (IJCET),
Vol. 5, Issue 8, pp. 118 – 129, August 2014.
[22] Z. Kh. AL-Ani, A. A. Zaidan, B .B. Zaidan and H. O. Alanazi, "Overview:
Main Fundamentals for Steganography", Journal of Computing, Vol. 2,
Issue 3, pp. 158 – 165, March 2010.
[23] M. Mishra, P. Mishra and M. C. Adhikary, "Digital Image Data Hiding
Techniques: A Comparative Study", ANSVESA, Vol. 7, No. 2, pp. 105-
115, 2012.
[24] Chetan, D. Sharma, "A Survey of Image Compression and Steganography
Techniques", International Journal of Advanced Research in Computer
Science and Software Engineering (IJARCSSE), Vol. 5, Issue 4, pp. 727 –