Author:
Kumar Sujeet,Pujari Shejal,Kulkarni Abhishek,Misal Pawan,Kale Ishaan R.
Publisher
Springer Nature Singapore
Reference21 articles.
1. Upham, D. JPEG-Jsteg-v4. http://www.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz
2. Chang, C. C., Chen, T. S., & Chung, L. Z. (2002). A steganographic method based upon JPEG and quantization table modification, Information. Science, 141, 123–138.
3. Noda, H., Niimi, M., & Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recognition Letters, 27(5), 455–461.
4. Kennedy, J., & Eberhart, R. C. (1995). Particle swarm optimization. In Proceedings of IEEE International Conference on Neural Networks (pp. 1942–1948).
5. Shi, Y., & Eberhart, R. C. (1999). Empirical study of particle swarm optimization. In Proceedings of the 1st Congress on Evolutionary Computation, Washington DC (pp. 1945–1950).