@incollection{, 59EE6AC3CE550D6B7117C4F125FEAF5B , author={{HarshaS} and {ShaileshKumar} and {Dr. Khalid Nazim SattarAbdus} and {Dr. KeshavaPrasanna} and {Shantanu AgaraDwarakanath} and {Visvesvaraya Technological Univeristy}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1621923 } @incollection{b0, , title={{On the Limits of steganography}} , author={{ RJAnderson } and { FA PPetitcolas }} , booktitle={{Selected Areas in Communication}} , year={1998} 16 } @incollection{b1, , title={{An evaluation of imagebased steganography methods}} , author={{ KBailey } and { KCurran }} , journal={{International Journal of Digital Evidence}} , year={2003} } @book{b2, , title={{A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography}} , author={{ MChapman } and { GDavida } and { RennhardM }} , year={2003} } @incollection{b3, , title={{Predictive-CodingBased Steganography and Modification for Enhanced Security}} , author={{ YDai } and { GLiu } and { Wangz }} , journal={{IJCSNS International Journal of Computer Science and Network Security}} 6 3b , year={March 2006} } @incollection{b4, , title={{A new Steganographic method for color and gray scale image hiding}} , author={{ Chin-ChenChang } and { Iuan-ChangLin } and { Yaun-Hui } and { YU }} , booktitle={{Computer Vision and Image Understanding}} , year={20 December 2006} } @incollection{b5, , title={{A new Approach to Persian/Arabic Text Stegraphy}} , author={{ MShareza Shirali }} , journal={{Computer and Information Science}} 5 , year={2006, ICISCOMSAR 2006} } @book{b6, , title={{IEEE/ACIS International Conference}} , year={July 2006} } @book{b7, , title={{Information Hiding: Techniques for Steganography and Digital Watermarking}} , author={{ APFabien } and { Petitcolas }} , year={2000} , publisher={Artech House} , address={Boston} } @book{b8, , title={{Digital Watermarking for Digital Media, Information Science Publishing}} } @book{b9, , title={{Hiding in Plain Sight: Steganography and the Art of Covert Communication}} , author={{ EricCole }} , year={2003} , publisher={Wiley} } @book{b10, , author={{ NeilFJohnson } and { Doric }} , title={{Zoran / Jajodia Information Hiding: Steganography and Watermarking Attacks and Countermeasures}} U.S.A. , publisher={Springer} , year={2001} 1 , note={Advances in Information Security} } @incollection{b11, , title={{Steganography: Hidden Data. Quick study by Deborah Radcliff}} , journal={{Computerworld}} } @incollection{b12, , title={{Combination of Cyphertext and Audio Steganography Technique for Secrete Communication}} , author={{ DamodarGujarati } and { BasicEconometrics }} , journal={{International Journal of Emerging Technology and Advanced Engineering}} 2250- 2459 2 12 , year={2003 13. December 2012} , publisher={McGraw-Hill Publications} , note={Budda Lavanya, Vittapu Sravan kumar} }