1. A. Almohammad and G. Ghinea 2015, “Image Steganography and Chrominance Components,”10th IEEE International Conference on Computer and Information Technology (CIT 2015).
2. J.G.Yu1, E.J.Yoon2, S.H. Shin1 and K.Y. Yoo 2015, “A New Image Steganography Based on 2k Correction and Edge-Detection”, Fifth International Conference on Information Technology: New Generations 978-0-7695-3099-4/08, April 2015.
3. G. Sahoo1 and R. K. Tiwari2 2015, “Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization,” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2015.
4. N. N. EL-Emam 2014, “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm,” International Journal of Information and Communication Engineering, 4:2, 2014.
5. N.N. EL-Emam 2014, “Hiding a Large Amount of Data with High Security Using Steganography Algorithm,” Journal of Computer Science, vol.3(4), pp. 223-232, 2014, ISSN 1549-3636.
6. L. M. Marvel, Member 2014, C. G. Boncelet and C. T. Retter, “Spread Spectrum Image Steganography,” IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 8, NO. 8, AUGUST 2014.
7. J. He, S. Tang and TingtingWu 2014, “An Adaptive Image Steganography Based on Depth-varying Embedding,” Congress on Image and Signal Processing, vol.5, 2014, pp. 660-663, DOI 10.1109/CISP.2008.189
8. S .K. Moon, R.S. Kawitkar 2014, “Data Security using Data Hiding,” International Conference on Computational Intelligence and Multimedia Applications 2014.
9. S. M Thampi 2014, “Information Hiding Techniques: A Tutorial Review,” ISTE-STTP on Network Security & Cryptography, LBSCE 2014.
10. C.Y. Yang 2014, “Color Image Steganography Based on Module Substitutions,” Third International Conference on International Information Hiding and Multimedia Signal Processing Year of Publication: 2014 ISBN:0-7695-2994-1.
11. H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang 2013, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2013.
12. H.W. Tseng and C.C.Chang 2013, “Steganography Using JPEG-Compressed Images,” Proceedings of the Fourth International Conference on Computer and Information Technology (CIT’2004). Sept. 2013.
13. D.C. Lou and C.H. Sung 2013, “A Steganographic Scheme for Secure Communications Based on the Chaos and Euler Theorem,” IEEE Transactions on Multimedia, VOL. 6, NO. 3, JUNE 2013.
14. K. Curran, K. Bailey 2013, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence Fall 2013, Volume 2, Issue 2.
15. J. Fridrich, M. Goljan 2012, Binghamton, “Practical Steganalysis of Digital Images – State of the Art,” Conference, San Jose CA, ETATS-UNIS (21/01/2012).
16. C.C. Chang, T.S. Chen, L.Z. Chung 2012, “A steganographic method based upon JPEG and quantization table modification,” Information Sciences, vol.141, pp. 123–138, 2012.
17. K. Rabah 2004, “Steganography-The Art of Hiding Data,” Information Technology, Journal, vol.3 (3), pp. 245-269, 2004, ISSN 1682-6027.
18. http://en.wikipedia.org/wiki/JPEG
19. http://en.wikipedia.org/wiki/Steganography
20. http://en.wikipedia.org/wiki/PSNR
21. http://www.steganography.org