1. Bhattacharyya, D., Das, P., Bandyopadhyay, S.K., Kim, T.H.: Text steganography: a novel approach. Int. J. Adv. Sci. Technol. 3(1), 79–85 (2009)
2. Bhowal, K., Bhattacharyya, D., Pal, A.J., Kim, T.H.: A GA based audio steganography with enhanced security. Telecommun. Syst. 52(4), 2197–2204 (2013)
3. Chen, M.C., Agaian, S.S., Chen, C.P.: Generalized collage steganography on images. In: 2008 IEEE International Conference on Systems, Man and Cybernetics, pp. 1043–1047. IEEE (2008)
4. El\_Rahman, S.A.: A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng. 70, 380–399 (2018)
5. Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: breaking the f5 algorithm. In: International Workshop on Information Hiding, pp. 310–323. Springer (2002)