1. Kumar BR, Murti PR (2011) Data security and authentication using steganography. Int J Comput Sci Inf Technol 2(4):1453–1456
2. Sherif M, Badr M, Salim I (2014) A review on steganalysis techniques: from image format point of view. Int J Comput Appl 1:0975–8887
3. Shankar DD, Upadhyay P (2016) Performance analysis of various feature sets in calibrated blind steganalysis. Int J Comput Sci Netw Secur 16:29
4. Goljan M, Fridrich J, Soukal T (2003) Higher-order statistical steganalysis of palette images. Proc SPIE 5020:178–190
5. Ker AD (2005) A general framework for the structural analysis of LSB replacement. In: Proceedings of the 7th information hiding workshop, pp 296–311