1. Khan Z, Shah M, Naeem M, Mahmood T, Khan S, Amin N, Shahzad D (2016) Threshold based steganography: a novel technique for improved payload and SNR. Inte Arab J Inf Technol 13(4):380–386
2. Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
3. Mehta AM, Lanzisera S, Pister KSJ (2016) Steganography 802.15.4 wireless communication
4. Morkel T, Eloff JHP, Oliver MS (2015) An over view of image steganography. Information and Computer Security Architecture (CSA) Research Group
5. Chandramoul R, Memon N (2014) Analysis of LSB based image steganography techniques. 0-7803-6725- 1/0 1/$10.00 IEEE