Author:
Karthikeyan N.,Kousalya K.,Krishnamoorthy N.,Jayapandian N.
Reference8 articles.
1. Amin MBM, Ibrahim PS, Salleh PM, Katmin MR, "Steganography: Random LSB Insertion Using Discrete Logarithm", Conference on Information Technology in Asia, pp. 234–238, 2003.
2. Castiglione A., Fiore U., Palmieri F., "E-mail-based Covert Channels for Asynchronous Message Steganography", 5th IEEE International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 503–508, 2011
3. Jaswinder Kaur, Inderjeet & Manoj Duhan, (2009) “A Comparative Analysis of Steganographic Techniques”, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 1, pp 191–194.
4. Kamran Khan M., Naseem M., Hussain M. and Ajmal A., "Distributed Least Significant Bit Technique for Data Hiding in Images", Multitopic Conference, IEEE, pp. 149–154, 2011.
5. A New Approach for Information Security using an Improved Steganography Technique