Author:
Daggumati Gnana Prasunamba,Banik Barnali Gupta
Reference29 articles.
1. R.Radescu and R. Gliga, “An introduction to steganography,” UPB Scientific Bulletin, Series C: Electrical Engineering 64(1-4), 17–24 (2004).
2. N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” IEEE Computer Society PressWashingtonDCUnited States ISSN:0018-9162 (Feb. 1998).
3. A. fatah A Tamimi, A. M. Abdalla, and O. Al-Allaf, “Hiding an image inside another image using variable-rate steganography,” IJACSA (2013).
4. D. Garg and G. Sharma, “Applications of steganography in information hiding,” International Journal of Advanced Research in Education & Technology (IJARET) Vol. 3 Issue 1 (Jan. 2016).
5. R. Doshi, P. Jain, and L. Gupta, “Steganography and its applications in security,” International Journal of Modern Engineering Research (IJMER) Vol. 2 (2012).