@incollection{, D2B6D7ECB87FF1EECFA2F5EEEE0C0817 , author={{V RSasikumar} and {Capt. Dr S SanthoshBaboo} and {Manonmaniam Sundaranar University}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}15619 } @incollection{b0, , title={{Message hiding in binary text documents}} , author={{ QGMei } and { EKWong } and { NDMemon }} , booktitle={{Proc. SPIE}} SPIE , year={Aug. 2001} 4314 } @incollection{b1, , title={{A secure message hiding scheme for binary images}} , author={{ Y.-CTseng } and { Y.-Y.Chen } and { H.-KPan }} , journal={{IEEE Trans. Commun}} 50 8 , year={Aug. 2002} } @incollection{b2, , title={{Message hiding in binary image for authentication and annotation}} , author={{ MWu } and { BLiu }} , journal={{IEEE Trans. Multimedia}} 6 4 , year={Aug. 2004} } @incollection{b3, , title={{Pattern-based message hiding for binary image authentication by connectivity-preserving}} , author={{ HYang } and { ACKot }} , journal={{IEEE Trans. Multimedia}} 9 3 , year={Apr. 2007} } @incollection{b4, , title={{Orthogonal message hiding for binary images in morphological transform region-A high-capacity approach}} , author={{ HYang } and { ACKot } and { SRahardja }} , journal={{IEEE Trans. Multimedia}} 10 3 , year={Apr. 2008} } @incollection{b5, , title={{High capacity message hiding for binary image authentication}} , author={{ MGuo } and { HZhang }} , booktitle={{Proc. Int. Conf. Pattern Recognit}} Int. Conf. Pattern Recognit , year={Aug. 2010} } @incollection{b6, , title={{On establishing edge adaptive grid for bilevel image message hiding}} , author={{ HCao } and { ACKot }} , journal={{IEEE Trans. Inf. Forensics Safety measure}} 8 9 , year={Sep. 2013} } @incollection{b7, , title={{Minimizing additive misinterpretation in steganography using syndrome-trellis codes}} , author={{ TFiller } and { JJudas } and { JJFridrich }} , journal={{IEEE Trans. Inf. Forensics Safety measure}} 6 3 , year={Sep. 2011} } @incollection{b8, , title={{Using highdimensional image models to perform highly undetectable steganography}} , author={{ TPevný } and { TFiller } and { PBas }} , booktitle={{Knowledge Hiding}} , booktitle={{Lecture Notes in Computer Science}} , editor={ RBöhme PW LFong RSafavi-Naini } New York, NY, USA , publisher={Springer-Verlag} , year={Oct. 2010} 6387 } @incollection{b9, , title={{Designing steganographic misinterpretation using directional filters}} , author={{ VHolub } and { JFridrich }} , booktitle={{Proc. IEEE Int. Workshop Inf. Forensics Safety measure}} IEEE Int. Workshop Inf. Forensics Safety measure , year={Dec. 2012} } @incollection{b10, , title={{Misinterpretation function designing for JPEG steganography with uncompressed side-image}} , author={{ FHuang } and { WLuo } and { JHuang } and { YQShi }} , booktitle={{Proc. 1st ACM Workshop Inf. Hiding Multimedia Safety measure}} 1st ACM Workshop Inf. Hiding Multimedia Safety measure , year={2013} } @incollection{b11, , title={{Defending against statistical steganalysis}} , author={{ NProvos }} , booktitle={{Proc. 10th Conf. USENIX Safety measure Symp}} 10th Conf. USENIX Safety measure Symp , year={2001} } @incollection{b12, , title={{Model-based steganography}} , author={{ PSallee }} , booktitle={{Proc. 2nd Int. Workshop Digital Watermarking}} 2nd Int. Workshop Digital Watermarking , year={2003} } @incollection{b13, , title={{Color text image binarization based on binary balance analysis}} , author={{ BWang } and { X.-FLi } and { FLiu } and { F.-QHu }} , journal={{Pattern Recognit. Lett}} 26 11 , year={2005} } @incollection{b14, , title={{Local binary arrangement and its application to facial image analysis: A survey}} , author={{ DHuang } and { CShan } and { MArdabilian } and { YWang } and { LChen }} , journal={{Man, Cybern. C, Appl. Rev}} 41 6 , year={Nov. 2011} , note={IEEE Trans. Syst.} } @incollection{b15, , title={{Multiresolution gray-scale and turn invariant balance classification with local binary arrangement}} , author={{ TOjala } and { MPietikainen } and { TMaenpaa }} , journal={{IEEE Trans. Pattern Anal. Mach. Intell}} 24 7 , year={Jul. 2002} } @incollection{b16, , title={{Balance analysis}} , author={{ MTuceryan } and { AKJain }} , booktitle={{Handbook of Pattern Recognition and Computer Vision}} Singapore , publisher={World Scientific} , year={1993} 2 } @incollection{b17, , title={{A discriminative feature space for detecting and recognizing faces}} , author={{ AHadid } and { MPietikainen } and { TAhonen }} , booktitle={{Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit}} IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit , year={Jun./Jul. 2004} 2 } @incollection{b18, , title={{Textural features for steganalysis}} , author={{ YQShi } and { PSutthiwan } and { LChen }} , booktitle={{Knowledge Hiding}} New York, NY, USA , publisher={Springer-Verlag} , year={2013} } @book{b19, , title={{Assessment of steganalytic approach using multiple regression models," in Knowledge Hiding}} , author={{ RBöhme }} , year={2005} , publisher={Springer-Verlag} , address={New York, NY, USA} } @incollection{b20, , title={{Distance-reciprocal misinterpretation allotment for binary document images}} , author={{ HLu } and { ACKot } and { YQShi }} , journal={{IEEE Signal Process. Lett}} 11 2 , year={Feb. 2004} } @incollection{b21, , title={{Objective misinterpretation allotment for binary text image based on edge line segment similarity}} , author={{ JCheng } and { ACKot }} , journal={{IEEE Trans. Image Process}} 16 6 , year={Jun. 2007} } @incollection{b22, , title={{Binary image authentication with tampering localization by hiding cryptographic signature and block identifier}} , author={{ HYang } and { ACKot }} , journal={{IEEE Signal Process. Lett}} 13 12 , year={Dec. 2006} } @incollection{b23, , title={{Provably secure steganography: Achieving zero K-L divergence using statistical restoration}} , author={{ KSolanki } and { KSullivan } and { UMadhow } and { BSManjunath } and { SChandrasekaran }} , booktitle={{Proc. IEEE Int. Conf. Image Process}} IEEE Int. Conf. Image ess , year={Oct. 2006} } @incollection{b24, , title={{Constructing good covering codes for applications in steganography}} , author={{ JBierbrauer } and { JFridrich }} , booktitle={{Transactions on Message Hiding and Multimedia Safety measure III}} Berlin, Germore , publisher={Springer-Verlag} , year={2008} }