References - Information and Library Network...

28
Information Hiding in Image and Audio Files 2007-2010 255 References [1] M. Kharrazi, H. Sencar and N. Menon, “Image Steganography: Concepts and Practice”, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2004. [2] Ing. Giacomo Cancelli, “New techniques or steganography and steganalysis in the pixel domain” Ph. D. Thesis, Ciclo XXI May 13th, 2009, Available online at:http://www.arehna.di.uoa.gr/thesis/uploaded_data/New_ Techniques_for_Steganography_and_Steganalysis_in_the_Pi xel_Domain_2009_thesis_1245340893.pdf [3] D. Stinson, “Cryptography: Theory and Practice”, 2nd Edition, Chapman and Hall/ CRC, February 2002 [4] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn “Information Hiding A Survey”, Proc, special issue on protection of multimedia content, vol. 87, no.7, pp.1062- 1078, July 1999. [5] Johnson, Neil F., “Steganography”, [Online]. Available at: http://www.jjtc.com/ stegdoc / index2 .html, Technical Report, November 1995. [Accessed: June 12, 2008]. [6] Bret Dunbar, “A detailed look at Steganographic Techniques and their use in an Open-Systems Environment”, SANS Institute InfoSec Reading Room, Available:at:http://www.sans.org/reading_room/whitepaper s/covert/a_detailed_look_at_steganographic_techniques_an

Transcript of References - Information and Library Network...

Page 1: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

255

References

[1] M. Kharrazi, H. Sencar and N. Menon, “Image

Steganography: Concepts and Practice”, Lecture Notes

Series, Institute for Mathematical Sciences, National

University of Singapore, 2004.

[2] Ing. Giacomo Cancelli, “New techniques or steganography

and steganalysis in the pixel domain” Ph. D. Thesis, Ciclo

XXI – May 13th, 2009, Available online

at:http://www.arehna.di.uoa.gr/thesis/uploaded_data/New_

Techniques_for_Steganography_and_Steganalysis_in_the_Pi

xel_Domain_2009_thesis_1245340893.pdf

[3] D. Stinson, “Cryptography: Theory and Practice”, 2nd

Edition, Chapman and Hall/ CRC, February 2002

[4] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G.

Kuhn “Information Hiding A Survey”, Proc, special issue on

protection of multimedia content, vol. 87, no.7, pp.1062-

1078, July 1999.

[5] Johnson, Neil F., “Steganography”, [Online]. Available at:

http://www.jjtc.com/ stegdoc / index2 .html, Technical

Report, November 1995. [Accessed: June 12, 2008].

[6] Bret Dunbar, “A detailed look at Steganographic Techniques

and their use in an Open-Systems Environment”, SANS

Institute InfoSec Reading Room,

Available:at:http://www.sans.org/reading_room/whitepaper

s/covert/a_detailed_look_at_steganographic_techniques_an

Page 2: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

256

d_their_use_in_an_opensystems_environment_677.

[Accessed: June 12, 2008]

[7] Hamid Izadinia, Fereshteh and Mohammad Rahmati, “A New

Steganography Method Using Quantization Index

Modulation,” Proceedings of the 2009 International

Conference on Computer and Automation Engineering, pp.

181-185

[8] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, "Digital

Image Steganography: Survey and Analyses of Current

Methods". Signal Processing, Volume 90, Issue 3, March

2010, Pages 727-752.

[9] Joshua Silman, “Steganography and Steganalysis: An

Overview”, SANS Institute InfoSec Reading Room, [Online].

Available

at:http://www.sans.org/reading_room/whitepapers/stengan

ography/steganography-steganalysis-overview_553

[Accessed: Oct 15, 2010].

[10] T Morkel, JHP. Eloff , MS Olivier, “An Overview of Image

Steganography,” in Proceedings of the Fifth Annual

Information Security South Africa Conference (ISSA 2005),

Sandron, South Africa, June/July 2005(Published

Electronically)

[11] G. Simmons, “The Prisoners' Problem and the Subliminal

Channel,” CRYPTO83 -Advances in Cryptology, August 22-

24. 1984. pp. 51–67.

Page 3: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

257

[12] D. Kundur, D. Hatzinakos, “Digital Watermarking using

Multi-resolution Wavelet Decomposition,” In IEEE

ICASSP'98, volume 5, pages 2659– 2662, Seattle, May

1998.

[13] H. Qi, W. Snyder and W. Sander, “Blind Consistency Based

Steganography For Information Hiding In Digital Media,”

IEEE International Conference on Multimedia and Expo,

2002. ICME'02. Proceedings 2002, Volume: 1 , pp: 585 –

588, August. 2002.

[14] T. Sharp, “An Implementation of Key-Based Digital Signal

Steganography,” Information Hiding, LNCS 2137/2001, pp.

13-26

[15] V. Licks and R. Hordan, “On digital image watermarking

robust to geometric transformations,” International

Conference on Image Processing, Volume: 3 , pp.690–693,

September, 2000

[16] H. Liu, J. Liu, J. Huang, D. Huang and Y. Shi, “A robust

DWT-based blind data hiding algorithm,” IEEE International

Symposium on Circuits and Systems, ISCAS 2002, Volume:

2 , pp. II-672 -II-675, May 2002

[17] G. Elmasry and Y. Shi, “2-D Interleaving for Enhancing the

Robustness of Watermark Signals Embedded in Still

Images,” IEEE International Conference on Multimedia and

Expo (II) pp. 731–734, 2000

[18] M. Marvel, C. Retter and C. Boncelet, “A methodology for

data hiding using images,” IEEE Proceedings on Military

Page 4: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

258

Communications Conference, MILCOM 98, Volume: 3, pp.

1044–1047, October 1998.

[19] G. Pan, Z. Wu, Y. Pan, “A data hiding method for few-color

images,” Proceedings IEEE International Conference on

Acoustics, Speech, and Signal Processing, (ICASSP '02),

Volume: 4, pp. 3469–3472, May 2002

[20] Y. Tseng, Y. Chen and H. Pan, “A secure data hiding scheme

for binary images,” IEEE Transactions on Communications,

Volume: 50 Issue: 8, pp. 1227 -1231, Aug. 2002.

[21] http://spectrum.ieee.org/telecom/internet/vice-over-ip-the-

voip-steganography-threat

[22] Neil F. Johnson ,”Steganography”, Technical Report.

November 1995 [online] Available online at:

http://www.jjtc.com/stegdoc/sec202.html

[23] David Khan, “ The History of Steganography,” Lecture Notes

In Computer Science; Vol. 1174, Proceedings of the First

International Workshop on Information Hiding, Springer-

Verlag London, UK 1996 pp. 1 – 5.

[24] K. K. Ravi Ayappa, “Steganography - Information Hiding for

secure communication” Technical Report [online] Available

at :

http://www.amrita.edu/cyberworkshop/proceedings/icscf09_

submission_97.pdf

Page 5: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

259

[25] Gregori Kipper, Investigator‟s guide to steganography, 2nd

ed. CRC Perss, 2004 [E-book] pp 39-40.Available: http://

www.Amazon.com

[26] Wu, H.-C., Wu, N.-I., Tsai, C.-S, Hwang, M.-S ,”Image

steganographic scheme based on pixel-value differencing

and LSB replacement methods,” Vision, Image and Signal

Processing, IEE Proceedings - Volume 152, Issue 5, 7 Oct.

2005.

[27] C.K Chan and L.M Cheng,” Hiding data in images by simple

LSB substitution,” Pattern Recognition, Vol. 37, No. 3.

(March 2004), pp. 469-474.

[28] Neil F. Johnson and Sushil Jajodia, “Steganalysis: The

Investigation of Hidden Information”, Information

Technology Conference, IEEE. Pp 113-116. September 1998.

[29] C. C. Chang, J. Y. Hsiao, and C. S. Chan, “Finding optimal

LSB substitution in image hiding by dynamic programming

strategy,” Pattern Recognition., vol. 36, no. 7, pp. 1583-

1595, 2003.

[30] Z. M. Lu, J. S. Pan, and S. H. Sun, “VQ-based digital image

watermarking method,” Electron. Lett., Vol. 36, no. 14, pp.

1201–1202, 2000

[31] Nedeljko Cvejic , “Algorithms for audio watermarking and

steganography” ,

http://herkules.oulu.fi/isbn9514273842/isbn9514273842.pd

f, 2004

Page 6: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

260

[32] C.C. Chang, T.C. Lu, “A difference expansion oriented data

hiding scheme for restoring the original host images”, J.

Syst. Softw. 79 (12) (2006) 1754–1766

[33] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar ,

“Increased Capacity of Information Hiding in LSB‟s method

for text and Image” , International Journal of Electrical,

Computer and Systems Engineering , volume 2, No. 4

http://www.waset.org/ijecse/v2/ v2-4-34.pdf (Europe)

[34] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar ,

“Polynomial Transformation to improve Capacity of Cover

Image for Information Hiding in Multiple LSB‟s”,

International Journal of Engineering Research and Industrial

Applications (IJERIA),Ascent Publications, Volume II, March

2009.Pune (India)

[35] H. B. Kekre, Archana Athawale and Pallavi N.Halarnkar,

“Performance Evaluation Of Pixel Value Differencing And

Kekre‟s Modified Algorithm For Information Hiding In

Images”, ACM International Conference on Advances in

Computing, Communication and Control (ICAC3).2009

(Uploaded on ACM Portal:

http://portal.acm.org/citation.cfm?id=1523103.1523172).

[36] D. C. Wu and W. H. Tsai, “A steganographic method for

images by pixel-value differencing,” Pattern Recognition

Letters, vol. 24, no. 9-10, pp. 1613-1626, June 2003

[37] Hong-juan zhang, hong-jun tang , “A Novel Image

Steganography Algorithm against Statistical Analysis”, Proc.

Page 7: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

261

sixth Int. Conf on machine learning and cybernetics, ,vol. 7.,

pp. 3884-3888, Hong Kong , 19-22 august 2007

[38] A. Ker, “Steganalysis of LSB Matching in Grayscale Images.”

IEEE Signal Processing Letters, vol. 12, no.6, pp. 441–444,

2005

[39] J. Mielikainen, “LSB Matching Revisited,” IEEE Signal

Processing Letters, vol. 13, no.5, May 2006.

[40] Smo-huliiv ,T un-hang Chen, hong-xun yao, Wen gao, “A

Variable Depth LSB Data Hiding Technique in Images” Proc

,Third Int. Conf. on machine learing and cybernetics,

shanghai, 26-29 August 2004,

[41] Rehab H. Alwan, Fadhil J. Kadhim, and Ahmad T. Al-Taani,

“Data Embedding Based on Better Use of Bits in Image

Pixels”, International Journal of Signal Processing 2006.,

Available: http://www.waset.org/journals/ijsp/v2/v2-2-

15.pdf

[42] Sandipan Dey, Ajith Abraham, Sugata Sanyal , “An LSB Data

Hiding Technique Using Prime Numbers”, third International

Symposium on Information Assurance and Security, pp.

101-108., 29-31st August, 2007

[43] Daniela Stanescu, Mircea Stratulat, Voicu Groza, Joana

Ghergulescu, Daniel Borca, “Steganography in YUV color

space” IEEE International Workshop on Robotic and Sensors

Environments Ottawa - Canada, pp. 1-4., 12-13 October

2007

Page 8: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

262

[44] Ching-Yu Yang, “Based upon RBTC and LSB Substitution to

Hide Data”, Proc. First Int. Conf. Innovative Computing,

Information and Control (ICICIC'06), vol. 1, pp.476-479,

30th Aug- 1st Sept 2006.

[45] Ching-Yu Yang, “Color Image Steganography based on

Module Substitutions”, Proc. Third Int Conf. Intelligent

Information Hiding and multimedia Signal Processing., vol.

2, pp.118-121, 26th -28th Nov 2007

[46] Jing-Ming Guo, “Complementary Steganography in Error-

Diffused Block Truncation Coding Images”, Proc. Third Int.

Conf. Intelligent Information Hiding and Multimedia Signal

Processing, vol. 2, pp. 134-140, 26-28 Nov 2007

[47] Chun-Hsiang Huang, Shang-Chih Chuang, and Ja-Ling Wu,

“Digital-Invisible-Ink Data Hiding Based on Spread-

Spectrum and Quantization Techniques”, IEEE Trans.

Multimedia, vol. 10, no. 4,pp.557-569, June 2008.

[48] H. B. Kekre, Archana A. Athawale, “Information Hiding using

LSB technique with increased capacity”, International

Journal of Cryptography and Security, Volume 1. No. 2, Oct

2008.

[49] S.S. Agaian, D. Akopian, O. Caglayan, S. A. D‟Souza,

“Lossless Adaptive Digital Audio Steganography,” In Proc.

IEEE Int. Conf. Signals, Systems and Computers, pp. 903-

906, November 2005.

[50] Chung-Ming Wang , Nan-I Wu, Chwei-Shyong Tsai, Min-

Shiang Hwang, “A high quality steganographic method with

pixel-value differencing and modulus function” , ACM Journal

Page 9: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

263

of Systems and Software, vol.81, no.1, pp. 150–158,

January 2008.

[51] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, and

Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of

Images With Spatial LSB Domain Systems”, IEEE Trans.

Information Forensics and Security, vol. 3, no. 3, pp. 488-

497, September 2008.

[52] Santosh Arjun, Atul Negi, Chaithanya Kranthi, Divya Keerthi,

“An Approach to Adaptive Steganography Based on Matrix

Embedding”, Proc TENCON 2007, pp. 1-4., Oct. 30-Nov. 2,

2007.

[53] Kaliappan Gopalan, “An Image Steganography

Implementation for JPEG-Compressed Images”,

International Symposium on Communications and

Information Technologies, 2007, ISCIT '07, pp. 739-744.,

17-19th Oct.2007.

[54] S.D. Lin and C.F. Chen, A Robust DCT-based Watermarking

for Copyright Protection, IEEE Transactions on Consumer

Electron, vol. 46, no. 3, pp. 415-421, 2000

[55] Y.T. Wu and F.Y. Shih, Genetic algorithm based methodology

for breaking the steganalytic systems, IEEE Transactions on

Systems, Man and Cybernetics. Part B, vol. 36, no. 1, pp.

24-31, 2006

[56] Adel Almohammad, Robert M. Hierons and Gheorghita

Ghinea, “ High Capacity Steganographic Method Based Upon

JPEG ,” ARES, pp.544-549, 2008 Third International

Page 10: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

264

Conference on Availability, Reliability and Security, 2008,

Mar-04-08 to Mar-07-08

[57] R.O.EI Safy, H.H. Zayed and A. EI Dessouki, “An Adaptive

Steganographic Technique Based on Integer Wavelet

Transform,” International Conference on Networking and

Media Convergence, 2009 (ICNM) 2009 on 24-25 March,

Cairo

[58] P. Chen and H. Lin, “A DWT Approach for Image

Steganography”, International Journal of Applied Science

and Engineering 2006. 4,3 : 275-290.

[59] C. C. Chang, and C. Y. Lin,” Reversible Steganography for

VQ-compressed Images Using Side Matching and

Relocation”, IEEE Transactions on Information Forensics and

Security, vol. 1, no. 4, pp. 493-501, 2006

[60] A. Gersho and R. M. Gray, Vector Quantization and Signal

Compression. Norwell, MA: Kluwer, 1992.

[61] Z. N. Li and M. S. Drew, Fundamentals of Multimedia.

Englewood Cliffs, NJ: Prentice-Hall, Oct. 2003

[62] C. H. LEE, L. H. CHEN, “Fast Codeword Search Algorithm for

Vector Quantization”, IEE Proceedings Image Signal

Processing Vol 141, No. 3 June 1994

[63] N. M. Nasrabadi and R. King, “Image coding using vector

quantization: A review,” IEEE Transactions on.

Communication., vol. 36, no. 8, pp. 957–971, Aug. 1988

Page 11: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

265

[64] Y. Linde, A. Buzo, and R. M. Gray, “An algorithm for Vector

Quantizer Design,” IEEE Transactions on Communications.,

vol. COM- 28, no. 1, pp. 84-95, 1980

[65] T. Kim, “Side Match and Overlap Match Vector Quantizers for

Images,” IEEE Transactions on Image Processing, Vol. 1,

April 1992, pp. 170-185

[66] C. C. Chang, G. M. Chen and M. H. Lin, “Information Hiding

Based on Search-Order Coding for VQ Indices,” Pattern

Recognition Letters, Vol. 25, 2004, pp. 1253-1261

[67] Lin, Y.C., and Wang C.C.: „Digital images watermarking by

vector quantization‟. Proc. 9th National Computer

Symposium, Taichung, Taiwan, 1999, pp. 76–87

[68] Lu, Z.M., and Sun, S.H.: „Digital image watermarking

technique based on vector quantization‟, Electronic. Letters.,

2000, 36, (4), pp. 303–305

[69] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,

Kalpana R. Sagvekar, “High Payload using mixed codebooks

of Vector Quantization", International Journal on Computer

Science and Engineering (IJCSE), Vol. 02, No. 02, 2010,

352-356 Available at

http://www.enggjournals.com/ijcse/doc/IJCSE10-02-02-

43.pdf Chennai (India)

[70] H. B. Kekre, Archana A. Athawale, Dipali Sadavarti, “

Algorithm to Generate Kekre‟s Wavelet Transform from

Kekre‟s Transform”, International Journal of Engineering,

Science and Technology, (IJEST) ISSN:0975-5462, Vol.

Page 12: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

266

2(5), 2010, 756-767 website-

http://www.ijest.info/docs/IJEST10-02-05-22.pdf (India)

[71] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,

Kalpana R. Sagvekar, “Comparative Performance of

Information Hiding in Vector Quantized Codebooks using

LBG, KPE, KMCG and KFCG “International Journal of

Computer Science and Information Security, IJCSIS,

Website - http://sites.google.com/site/ijcsis/vol-8-no-2-

may-2010

[72] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,

Kalpana R. Sagvekar, “Increased Capacity of Information

Hiding using mixed codebooks of Vector Quantization

Algorithms: LBG, KPE and KMCG ", Advances in

Computational Sciences and Technology, (ACST).

ISSN0974-4738

[73] H. B. Kekre, Archana A. Athawale, Uttara A. Athawale,

“Increased Capacity for Information Hiding using Walsh

Transform“,ICWET-10 International Conference and

Workshop on Emerging Trends in Technology (ICWET 2010),

26-27 Feb 2010, Available on ACM Portal at

http://portal.acm.org/citation.cfm?id=1741906.1741923

[74] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“Performance Comparison of DCT and Walsh Transform for

Steganography”, International Conference and Workshop on

Emerging Trends in Technology (ICWET 2010), 26-27

Feb2010. Site:

http://portal.acm.org/citation.cfm?id=1741906.1741921&col

l=GUIDE&dl=GUIDE&CFID=91821685&CFTOKEN=15950099

Page 13: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

267

[75] H. B. Kekre, Archana A. Athawale, Dipali Sadavarti , “A

Novel Steganographic Scheme using Discrete Sine

Transform based on Energy Distribution” Springer-

International Conference on Contours of Computing

Technology (Thinkquest-2010), 13-14th Mar 2010 (to be

uploaded on Online Springer Link )

[76] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode ,

Kalpana R. Sagvekar, “ Information Hiding in Vector

Quantized Codebook” Springer-International Conference on

Contours of Computing Technology (Thinkquest-2010), 13-

14th Mar 2010 (to be uploaded on Online Springer Link )

[77] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“Comparative Study of Different Color Spaces for

Information Hiding using Multiple LSB‟s in Different

Components”, IEEE International Advance Computing

Conference IACC'09, held on 6th – 7th March 09, Patiala

Punjab.

[78] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“High Payload using High Boost Filtering in Kekre‟s Multiple

LSB‟s Algorithm”, 2nd International Conference on Advances

in Computer Vision and Information Technology ACVIT 2009,

16th -19th December 2009, Aurangabad.

[79] H. B. Kekre, Archana A. Athawale, Sudeep D. Thepade,

“Clandestine Data Entrenching and Salvaging “ National

Conference on Information and Communication Technology

29th Feb and 1st Mar, NCICT-08.

Page 14: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

268

[80] H. B. Kekre, Archana A. Athawale, “Personal Data Ingrain

and Regain”, NCA, FCRCE, Bandra(W), Mumbai, 16th -17th

May 2008.

[81] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“Robust and Secure Informatiion Hiding using Polynomial

Transformation in Kekre‟s LUV Color space and Multiple

LSB‟s”, National Conference on Information and

Communication Technology NCICT-09, 6-7 March 2009.

[82] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“Increased Capacity of Least Significant Bits Embedding For

Information Hiding”,TechnoPath Technical Magazine, NMIMS

University.Volume 1 No 1

[83] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

”High Payload using High Boost Filtering in Kekre‟s Multiple

LSB‟s Algorithm for Information Hiding”, Technopath

Technical Magazine May 2009, Volume 1 No2

[84] H. B. Kekre, Archana A. Athawale, Pallavi N. Halarnkar,

“Increased Capacity and High Security for Embedding Secret

Message in Transform Domain using Discrete Cosine

Transform”.

[85] H. B. Kekre, Archana A. Athawale, Tanuja K. Sarode,

Kalpana R. Sagvekar, “Mixing Codebooks of LBG, KPE and

KFCG Algorithms to Increase Capacity of Information

Hiding”, International Journal of Computer Science and

Security (IJCSS)(Malaysia)

Page 15: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

269

[86] B. Newman, Secrets of German Espionage. London: Robert

Hale Ltd, 1940

[87] J. E. Hoover, “The enemy‟s masterpiece of espionage.” The

Reader‟s Digest , vol. 48, pp. 49–53, May 1946, London

edition.

[88] C. I. Podilchuk and W. Zeng, “Digital image watermarking

using visual models.” In Rogowitz and Pappas [142], pp.

100– 111, ISBN 0-8194-2427-7.

[89] M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust data hiding

for images.” In 7th Digital Signal Processing Workshop (DSP

96), pp. 37–40, IEEE, Loen, Norway, Sep. 1996.

[90] J. F. Delaigle, C. De Vleeschouwer, and B. Macq,

“Watermarking algorithm based on a human visual model.”

Signal Processing, vol. 66, no. 3, pp. 319–335, May 1998,

ISSN 0165-1684, European Association for Signal Processing

(EURASIP)

[91] L. Boney, A. H. Tewfik, and K. N. Hamdy, “Digital

watermarks for audio signals.” In International Conference

on Multimedia Computing and Systems, pp. 473–480, IEEE,

Hiroshima, Japan, 17–23 Jun. 1996.

[92] F. Gon, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and J.-J.

Quisquater, “A low cost perceptive digital picture water-

marking method.” In Sethin and Jain [149], pp. 264–277,

ISBN 0-8194-2433-1.

Page 16: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

270

[93] R. J. Anderson, ed., Information hiding: First international

workshop, vol. 1174 of Lecture Notes in Computer Science,

Isaac Newton Institute, Cambridge, England, May 1996,

Springer-Verlag, Berlin, Germany, ISBN 3-540-61996-8.

[94] W. Sweldens, “The Scheme. A construction of

second generation Wavelets”, SAIM J. Math. Anal. 29:511-

546, 1997

[95] Jr. L. M. Marvel, C. G. Boncelet and C. T. Retter. “Spread

spectrum image steganography‟”. IEEE Transactions on

Image Processing, 8:1075–1083,1999.

[96] Nasir Memon R. Chandramouli, “Analysis of lsb based image

steganography techniques” In Proceedings of IEEE ICIP,

2001.

[97] Kran Bailey Kevin Curran. “An evaluation of image based

steganography methods”. International Journal of Digital

Evidence, Fall 2003, 2003.

[98] S. Katzenbeisser and F. A. P. Petitcolas. Information Hiding

Techniques for Steganography and Digital Watermarking.

Artech House, London, 2000.

[99] Z. Duric N. F. Johnson and S. Jajodia. Information Hiding :

Steganography and Digital Watermarking-Attacks and

Counter measures. Kluwer Academic, 2001.

[100] I. J. Cox, Ton Kalker, Georg Pakura and Machia Scheel,

“Information transmission and steganography, ” Lecture

Notes in Computer Science, vol. 3710, pp.15-29, 2005

Page 17: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

271

[101] Shahreza S.S., Shalmani, “Adaptive wavelet domain audio

steganography with high capacity and low error rate”, IEEE

International Conference on Acoustics, Speech and Signal

Processing, 2008 pp: 1729 – 1732, 2008.

[102] “audio steg : overview”, Internet publication on

www.snotmonkey.com.http://www.snotmonkey.com/work/s

chool/405/overview.html.

[103] Zamani M., Ahmad R.B., Manaf A.B.A., Zeki A.M., “An

Approach to Improve the Robustness of Substitution

Techniques of Audio Steganography”, in Proc. IEEE

International Conference on Computer Science and

Information Technology, ICCSIT pp: 5-9, 2009.

[104] Rade Petrovic, Joseph M. Winograd, Kanaan Jemili and Eric

Metois, “Data Hiding within Audio

signals”,http://factaee.elfak.ni.ac.rs/facta9902/ilja6.pdf.

[105] Swanson, M.D.; Bin Zhu; Tewfik, A.H., “Current state of the

art,challenges and future directions for audio watermarking”,

IEEE International Conference on Multimedia Computing and

Systems, vol.1, pp: 19 – 24, 7-11 June 1999.

[106] N. Cvejic and T. Seppanen, "Channel capacity of high bit

rate audio data hiding algorithms in diverse transform

domains," Proceeding of 2004 IEEE International

Symposium on Communications and Information

Technology, Vol.1, pp. 84- 88, October 2004.

[107] Nicola Cocchiaro, http://stegui.sourceforge.net/intro.html.

Page 18: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

272

[108] W. Bender, D. Gruhl, N.Morimoto, A. lu, “Techniques for

data hiding”, IBM Systems Journal, Vol. 35, Issue 3-4, pp.

313 – 336, 1996.

[109] Agaian, S.S., Akopian D., Caglayan O., D'Souza S.A.,

“Lossless Adaptive Digital Audio Steganography”,

Conference Record of the Thirty-Ninth Asilomar Conference

on Signals, Systems and Computers, pp. 903- 906, October

28 - November 1, 2005.

[110] http://www.wisegeek.com/what-is-a-wav-file.htm.

Last modified: 14 September 2009].

[111] Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay and

Sugata Sanyal, “Steganography and Steganalysis: different

approaches”, available at

http://www.tifr.res.in/~sanyal/papers/Soumyendu_Stegano

graphy_Steganalysis_different_approaches.pdf.

[112] Jonathan Watkins “ Steganography-Message hidden in

bits“at http://mms.ecs.soton.ac.uk.mms2002/papers/6.pdf

[113] N. Cvejic, T. Seppanen, "Increasing Robustness of LSB Audio

Steganography using a novel embedding method”, Proc.

IEEE Int. Conf Info. tech.: Coding and Computing, Vol. 2,

pp.533-537, April 2004.

[114] Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis

Ganguly, Swarnendu Mukherjee and Poulami Das, “A

Tutorial Review on Steganography”,IEEE IC3 Conference,

Noida India August 7-9, 2008

Page 19: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

273

[115] H. B. Kekre, Archana Athawale, Tanuja Sarode, Sudeep

Thepade and Kalpana Sagvekar, “Steganography using

Dictionary Sort on Vector Quantized Codebook”,

International Journal of Computer Science and Security

(IJCSS), Volume 4, Issue No 4, 2010,392-402

[116] Black, Paul E. (2005-12-19). "Fisher–Yates shuffle".

Dictionary of Algorithms and Data Structures. National

Institute of Standards and Technology.

http://www.nist.gov/dads/HTML/fisherYatesShuffle.html.

Retrieved 2007-08-09

[117] R. M. Gray, “Vector quantization”, IEEE ASSP Mag., pp.: 4-

29, Apr. 1984.

[118] Enhancement of LSB based Steganography for. Hiding

Image in Audio. Available on line at

http://www.enggjournals.com/ijcse/doc/IJCSE10-02-05-

73.pdf 05, 2010, pp: 1652-1658.

[119] Tanuja K. Sarode “Vector Quantization and its Applications”,

Ph.D. Thesis, MPSTME, NMIMS University, Mumbai, India,

July 2010.

[120] H.B.Kekre, Tanuja K. Sarode, “Vector Quantized Codebook

Optimization using Modified Genetic Algorithm” IETE Journal

of Research, vol. 56, No. 5, 257-264, Sept-Oct 2010.

[121] H. B. Kekre, Tanuja K. Sarode, “New Fast Improved

Codebook Generation Algorithm for Color Images using

Vector Quantization,” International Journal of Engineering

and Technology, vol.1, No.1, pp.: 67-77, September 2008.

Page 20: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

274

[122] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Generation

Algorithm for Color Images using Vector Quantization,”

International Journal of Computer Science and Information

Technology, Vol. 1, No. 1, pp.: 7-12, Jan 2009.

[123] H. B. Kekre, Tanuja K. Sarode, “An Efficient Fast Algorithm

to Generate Codebook for Vector Quantization,” First

International Conference on Emerging Trends in Engineering

and Technology, ICETET-2008, held at Raisoni College of

Engineering, Nagpur, India, pp.: 62- 67, 16-18 July 2008.

Avaliable at IEEE Xplore.

[124] H. B. Kekre, Tanuja K. Sarode “New Clustering Algorithm

for Vector Quantization using Rotation of Error Vector”,

International Journal of Computer Science and Information

Security, Vol. 7, No. 03, 2010, USA.

[125] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Generation

Algorithm for Color Images using Vector Quantization,”

International Journal of Computer Science and Information

Technology, Vol. 1, No. 1, pp.: 7-12, Jan 2009.

[126] H. B. Kekre, Tanuja K. Sarode, “Fast Codevector Search

Algorithm for 3-D Vector Quantized Codebook”, WASET

International Journal of cal Computer Information Science

and Engineering (IJCISE), Volume 2, No. 4, pp.: 235-239,

Fall 2008. Available: http://www.waset.org/ijcise.

[127] H. B. Kekre, Tanuja K. Sarode, “Fast Codebook Search

Algorithm for Vector Quantization using Sorting Technique”,

ACM International Conference on Advances in Computing,

Communication and Control (ICAC3-2009), pp: 317-325,

Page 21: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

275

23-24 Jan 2009, Fr. Conceicao Rodrigous College of Engg.,

Mumbai. Available on ACM portal.

[128] H. B. Kekre, Tanuja K. Sarode, “Vector Quantized Codebook

Optimization using K-Means”, International Journal on

Computer Science and Engineering (IJCSE) Vol.1, No. 3,

pp.: 283-290, 2009, Available online

at:http://journals.indexcopernicus.com/abstracted.php?level

=4&id_issue=839392.

[129] H. B. Kekre, Tanuja K. Sarode , “2-level Vector Quantization

Method for Codebook Design using Kekre‟s Median Codebook

Generation Algorithm”, Advances in Computational Sciences

and Technology (ACST), ISSN 0973-6107, vol. 2, no. 2,

pp.:167–178, 2009. Available online at.

http://www.ripublication.com/Volume/acstv2n2.htm.

[130] H. B. Kekre, Tanuja K. Sarode, “Multilevel Vector

Quantization Method for Codebook Generation”,

International Journal of Engineering Research and Industrial

Applications (IJERIA), vol. 2, no. V, pp.: 217-231, 2009.

Available online at. http://www.ascent-

journals.com/ijeria_contents_Vol2No5.htm.

[131] H. B. Kekre, Tanuja K. Sarode, “Bi-level Vector Quantization

Method for Codebook Generation”, Second International

Conference on Emerging Trends in Engineering and

Technlogy, at G. H. Raisoni College of Engineering, Nagpur

on 16-18 December 2009, this paper will be uploaded online

at IEEE Xplore.

[132] H. B. Kekre, Tanuja K. Sarode, “Speech Data Compression

using Vector Quantization”, WASET International Journal of

Page 22: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

276

Computer and Information Science and Engineering

(IJCISE), vol. 2, No. 4, pp.: 251-254, Fall 2008. available:

http://www.waset.org/ijcise.

[133] H. Y. M. Liao, D. Y. Chen, C. W. Su, and H. R. Tyan, “Real-

time event detection and its applications to surveillance

systems,” in Proc. IEEE Int. Symp. Circuits and Systems,

Kos, Greece, pp.: 509–512, May 2006.

[134] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image

Segmentation Using Kekre‟s Algorithm for Vector

Quantization”, WASET International Journal of Computer

Science (IJCS), vol. 3, no. 4, pp.: 287-292, Fall 2008.

http://www.waset.org/ijcs.

[135] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image

Segmentation using Vector Quantization Techniques Based

on Energy Ordering Concept”, International Journal of

Computing Science and Communication Technologies

(IJCSCT), vol. 1, no. 2, pp.: 164-171, January 2009.

[136] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image

Segmentation Using Vector Quantization Techniques”,

Advances in Engineering Science Sect. C (3), pp.: 35-42,

July-September 2008.

[137] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image

Segmentation Using Kekre‟s Fast Codebook Generation

Algorithm Based on Energy Ordering Concept”, Proceedings

of International Conference on Advances in Computing,

Communication and Control (ICAC3), pp.:357-362, Jan

2009, Available on ACM Portal.

Page 23: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

277

[138] H.B.Kekre, Tanuja K. Sarode, Bhakti Raul, “Color Image

Segmentation using Vector Quantization Techniques Based

on Energy Ordering Concept”, International Conference on

Advanced Computing & Communication Technology

(ICACCT-2008) Asia Pacific Institute of Information

Technology, Panipat India, 8-9 Nov 2008.

[139] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge “Detection of

Cancer Using Vector Quantization for Segmentation”,

International Journal of Computer Applications (IJCA) (0975

– 8887), Volume 4, No.9, August 2010, pp.:14-19.

[140] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge “SAR Image

Segmentation using Vector Quantization Technique on

Entropy Images”, International Journal of Computer Science

and Information Security, Vol. 7, No. 03, 2010, USA.

[141] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Tumor

Detection in Mammography Images using Vector

Quantization Technique” International Joint Journal

Conference on Computer and Communication Technology

(IJJCCT 2009), china.

[142] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Detection

and Demarcation of Tumor using Vector Quantization in MRI

images”, International Journal of Engineering Science and

Technology, Vol.1, Number (2), 2009, pp.: 59-66.

[143] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, “Tumor

Demarcation in Mammography Images using LBG on

Probability Image” Journal of Computer Applications (IJCA),

Vol. 2, June 2010, Germany.

Page 24: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

278

[144] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, Kavita Raut,

“Detection of Cancer Using Vector Quantization for

Segmentation”, International Journal of Computer

Applications (IJCA) (0975 – 8887), Volume 4 No.9, August

2010. USA. Available online at

http://www.ijcaonline.org/archives/volume4/number9/856-

1199.

[145] H. B. Kekre, Tanuja K. Sarode, Saylee Gharge, Kavita Raut,

““Detection Of Tumor In MRI Using Vector Quantization

Segmentation”, International Journal of Engineering Science

and Technology, Vol. 2(8), 2010, pp.: 3753-3757.

[146] H. B. Kekre, Kamal Shah, Tanuja K. Sarode, Sudeep D.

Thepade “Performance Comparison of Vector Quantization

Technique –KFCG with LBG, Existing Transforms and PCA for

Face Recognition”, International Journal of Information

Retrieval (IJIR), Vol. 02, Issue 1, 2009, pp.: 64-71.

[147] H.B.Kekre, T.K.Sarode, V.A.Bharadi, Tejas Bajaj, Somesh

Chatterjee, Mithilesh Bhat,Kunal Bihani “A Comparative

Study of DCT and Kekre‟s Median Code Book Generation

Algorithm for Face Recognition”, International Conference

and Workshop on Emerging Trends in Technology (ICWET

2010), at Thakur College of Engineering and Technology

(TCET), 26 & 27th February 2010, the paper is available on

ACM portal.

[148] H.B.Kekre, Kamal Shah, Tanuja K.Sarode “Application of

Kekre‟s Fast Code Book Generation Algorithm for Face

Recognition” International Conference and Workshop on

Emerging Trends in Technology (ICWET 2010), at Thakur

Page 25: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

279

College of Engineering and Technology (TCET), 26 & 27th

February 2010, the paper is uploaded on ACM portal.

[149] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora

, M C Nair, “Iris Recognition Using Vector Quantization”,

International Conference on Signal Acquisition and

Processing (ICSAP 2010), Organized by International

Association of Computer Science & Information Technology

(IACSIT) Singapore, held at Banglore, 9-10th February

2010. Available online on IEEEXplorer.

[150] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora

, M C Nair “Iris Recognition Using Discrete Cosine Transform

and Kekre‟s Fast Codebook Generation Algorithm”,

International Conference and Workshop on Emerging Trends

in Technology (ICWET 2010). To be held at Thakur College

of Engineering and Technology (TCET), 26 & 27th February

2010, Available online on IEEEXplorer ACM portal.

[151] H.B.Kekre, T.K.Sarode, V.A.Bharadi, A A Agrawal, R J Arora

, M C Nair, “Performance Comparison of DCT and VQ Based

Techniques for Iris Recognition” Journal of Electronic Science

and Technology, (JEST), Vol. 8, No. 3, pp.223 -229,

September, 2010.

[152] H.B.Kekre, Tanuja K. Sarode, Sudeep D. Thepade, Vaishali

Suryavanshi,“Improved Texture Feature Based Image

Retrieval using Kekre‟s Fast Codebook Generation

Algorithm”, Springer-International Conference on Contours

of Computing Technology (Thinkquest-2010), Babasaheb

Gawde Institute of Technology, Mumbai, 13-14 March 2010,

The paper will be uploaded on online Springerlink.

Page 26: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

280

[153] H.B.Kekre, Tanuja K. Sarode, Sudeep D. Thepade, “Image

Retrieval by Kekre‟s Transform Applied on Each Row of

Walsh Transformed VQ Codebook”, (Invited), ACM-

International Conference and Workshop on Emerging Trends

in Technology (ICWET 2010),Thakur College of Engg. And

Tech., Mumbai, 26-27 Feb 2010, The paper is invited at

ICWET 2010. Also will be uploaded on online ACM Portal.

[154] H. B. Kekre, Ms. Tanuja K. Sarode, Sudeep D. Thepade,

“Image Retrieval using Color-Texture Features from DCT on

VQ Codevectors obtained by Kekre‟s Fast Codebook

Generation”, ICGST-International Journal on Graphics,

Vision and Image Processing (GVIP), Volume 9, Issue 5, pp.:

1-8, September 2009. Available online at

http://www.icgst.com/gvip/Volume9/Issue5/P1150921752.h

tml

[155] H. B. Kekre, Tanuja K. Sarode, Sudeep D. Thepade, “Color-

Texture Based Feature Based Image Retrieval using DCT

applied on Kekre‟s Median Codebook “, International Journal

of Imaging (IJI), Volume 2, No. A09, Autumn 2009, ISSN

0974-0627. Available online at.

http://www.ceser.res.in/ceserp/index.php/iji/issue/view/72.

[156] H. B. Kekre, Tanuja K. Sarode, Sudeep D. Thepade , Pallavi

H. “Kekre‟s Fast Codebook Generation in VQ with Various

Color Spaces for Colorization of grayscale Images”

International Conference on Recent Trends in Business

Administration and Information Processing (BAIP 2010), the

paper will be available in Springer Digital Library.

[157] H. B. Kekre, Tanuja K. Sarode, Dhirendra Mishra “Coloring

Gray Scale Digital Images using Kekre‟s Fast Code Book

Page 27: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

281

Generation Algorithm”, International Conference and

Workshop on Emerging Trends in Technology (ICWET 2010).

To be held at Thakur College of Engineering and Technology

(TCET), 26 & 27th February 2010, Available online on

IEEEXplorer ACM portal.

[158] Chi-Nan Lin, Chin-Chen Chang, “A Best-pair-first capacity

distortion control for data hiding on VQ compression

domain”

[159] M. Jo and H. D. Kim, “A Digital Image Watermarking

Scheme Based on Vector Quantisation,” IEICE Trans. Inf. &

Syst., vol. E85-D, no. 6, June 2002, pp. 1054-1056

[160] Chin-Chen Chang, Tung-shou Chen, Hsien-Chu Hsia, “ An

Effective Image Steganographic Scheme based on Wavelet

Transformation and Pattern-Based Modification,” iccnmc, pp.

450,2003, International Conference on ComputerNetworks

and Mobile Computing (ICCNMC‟ 03), 2003.

[161] M. F. Tolba, M.A. –S. Ghonemy, I.A. –H. Taha, ”High

Capacity Image Steganography using Wavelet-based

Fusion,”iscc, vol. 1, pp. 430-435, the ninth IEEE symposium

on Computers and Communications 2004 volume 1 (ISCC‟

04).

[162] Digital Image Processing , Image Transforms - Dr. Tania

STATHAKI,website : http://www.commsp.ee.ic.ac.uk/~tania/

[163] Dr. H.B.Kekre , Archana Athawale, Swarnalata Rao and

Uttara Athawale , “Information Hiding in Audio Signals”,

International Journal of Computer Applications (IJCA), Vol. 7

No. 9, 14-19 October 2010

Page 28: References - Information and Library Network Centreshodhganga.inflibnet.ac.in/bitstream/10603/9089/14/14_references.pdf · ... Variable Depth LSB Data Hiding Technique in Images ...

Information Hiding in Image and Audio Files 2007-2010

282

[164] Dr. H.B.Kekre , Archana Athawale, Swarnalata Rao and

Uttara Athawale , “Increasing the Capacity of the Cover

Audio Signal by Using Multiple LSB‟s for Information Hiding”,

presented at the 3rd IEEE International Conference on

Emerging Trends in Engineering and Technology (ICETET),

19-21 Nov 2010.

[165] Khalid Sayood , “Introduction to Data Compression”, 2nd

edition 2005, Published by Harcourt India Private Limited