Author:
Amritha P. P.,Ravi Rithu P.,Sethumadhavan M.
Reference9 articles.
1. Amritha, P. P., & Gireesh, T. K. A Survey on Digital Image Steganographic Methods. In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp. 250–258. (2010).
2. R. Chandramouli., M. Kharrazi., N. Memon. Image steganography and steganalysis: Concepts and practice. In: T. Kalker, Y.M. Ro, and I. Cox, editors, Digital Watermarking, vol. 2939, pp. 35–49. Springer, Heidelberg (2004).
3. Y. J. Chanu., K. M. Singh., and T. Themrichon. A robust steganographic method based on singular value decomposition. Int. J. Inf. Comput. Technol 4 (7), pp. 717–726. (2014).
4. C. Bergman., and D. Jennifer. Unitary embedding for data hiding with the SVD. In Electronic Imaging, International Society for Optics and Photonics, pp. 619–630. (2005).
5. C. C. Chang, C.C. Lin and Y.S. Hu, An SVD oriented watermark embedding scheme with high qualities for the restored images, IJICIC, vol. 3, no. 3, pp. 609–620, (2007).