1. Discrete cosine transform;Ahmed;IEEE Transactions on Computers,1974
2. Enhancing the security and quality of lsb based image steganography;Akhtar,2013
3. Break our steganographic system: the ins and outs of organizing BOSS;Bas,2011
4. Bas, P., & Furon, T. (0000). BOWS-2. Retrieved from http://bows2.ec-lille.fr.
5. Deep residual network for steganalysis of digital images;Boroumand;IEEE Transactions on Information Forensics and Security,2019