1. Kumar BR, Murti PR (2011) Data security and authentication using steganography. Int J Comput Sci Inf Technol 2(4):1453–1456
2. Nagaraj V, Zayaraz G, Vijayalakshmi V (2011) Modulo based image steganography technique against statistical and histogram analysis. Netw Secur Cryptogr 34–39
3. Christaline JA, Ramesh R, Vaishali D (2014) Steganalysis with classifier combinations
4. Guttikonda JB, Sridevi R (2019) A new steganalysis approach with an efficient feature selection and classification algorithms for identifying the stego images. Multimed Tools Appl 1–19
5. Attaby AA, Alsammak AK, Mursi Ahmed MFM (2018) Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J 9(4)