@incollection{, 088D56BA75EAD904079AB84415B3CC63 , author={{Roopesh Kumar} and {Yogendra KumarJain} and {PankajAgarwal} and {Samrat Ashok Technological Institute , Vidisha (M.P.) 464001 India}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}111359 } @incollection{b0, , title={{An Information -Theoretic Model for Steganography}} , author={{ Cachin }} , journal={{Journal of Information and Computation}} 192 1 , year={July 2004} } @incollection{b1, , title={{Digital image steganography: Survey and analysis of current Methods}} , author={{ ACheddad } and { JCondell } and { KCurran } and { PMKevitt }} , journal={{Journal Signal Processing}} 90 , year={March 2010} , publisher={Elsevier} } @incollection{b2, , title={{Image Steganography and Steganalysis: Concepts and Practice}} , author={{ RChandramouli } and { MKharrazi } and { NMemon }} , booktitle={{International workshop on digital watermarking, IWDW 2003}} , year={2004} 2939 } @incollection{b3, , title={{Alternatives for multimedia messaging system steganography}} , author={{ KPapapanagiotou } and { EKellinis } and { GFMarias } and { PGeorgiadis }} , booktitle={{IEEE International Conference on Computational Intelligence and Security (CIS 2005), Part II}} Xian, China , year={Dec. 2005} 3802 } @incollection{b4, , title={{F5-steganographic algorithm: High capacity despite better steganalysis}} , author={{ Westfield }} , booktitle={{Lecture Notes in Computer Science}} 2137 , year={2001} , publisher={Springer Verlag} } @incollection{b5, , title={{Steganography in MMS}} , author={{ ShiraliShareja } and { M }} , booktitle={{IEEE International Multitopic Conference}} , year={2007. 2007} } @incollection{b6, , title={{Lightweight steganography on smart phones}} , author={{ MAmoroso } and { Masotti }} , booktitle={{3 rd IEEE Conference on Consumer Communications and Networking}} , year={2006. Jan. 2006} 2 } @incollection{b7, , title={{Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers}} , author={{ JCHernandez } and { JMSierra } and { ARibagorda } and { BRamos } and { JCMex-Perera }} , booktitle={{Proceeding of the 8 th IMA international conference on Cryptography and Coding}} eeding of the 8 th IMA international conference on Cryptography and Coding } @incollection{b8, , title={{A Tiny Encryption Algorithm}} , author={{ RWheeler } and { Needham } and { Tea }} , booktitle={{Proceeding of the 1995 Fast Software Encryption Workshop}} eeding of the 1995 Fast Software Encryption Workshop , publisher={Springer-Verlag} , year={1995} } @book{b9, , title={{Computer Vision, Graphics and image processing}} , author={{ AKJain }} , year={June 1989} 46 400 , note={Fundamental of digital image processing} } @incollection{b10, , title={{Performance evaluation of a JPEG-based multipledescription image coder}} , author={{ MMohsen } and { AMarzieh }} , booktitle={{Information Technology, ITSIM2008, International Symposium}} , year={August 2008} 4 } @incollection{b11, , title={{A New Steganalytic Algorithm for Detecting Jsteg}} , author={{ MWu } and { ZZhu } and { SJin }} , booktitle={{Proceeding of the Network and Distributed System Symposium}} , booktitle={{Lecture Notes in Computer Scienceon Networking and Mobile Computing}} eeding of the Network and Distributed System SymposiumSanDiego,CA; Washington, D.C , publisher={NDSS2002 Internet Society} , year={2005. 2005. February 2002} 3619 , note={Detecting Stegaraphic Content on the Internet} } @incollection{b12, , title={{Information Hiding -A Survey}} , author={{ APPetitcolas } and { RJAnderson } and { MGKuhn }} , booktitle={{Proceeding of the IEEE}} eeding of the IEEE , year={Jul 1999} 87 } @incollection{b13, , title={{Text Steganography in SMS}} , author={{ MShiraliShahreza } and { MHShirali } and { Shahreza }} , booktitle={{Convergence Information Technology, International Conference}} , year={2007} } @incollection{b14, , title={{Exploring Steganography: Seeing the unseen}} , author={{ MHasan Shirali } and { MShahreza } and { Sirali } and { Shahreza }} , booktitle={{Computer System and Applications, AICCSA, IEEE International Conference}} , editor={ .N FJohnson SJajodia } , year={March 2008. Feb-1998} , note={Steganography in SMS by Sudoku puzzle} } @book{b15, , author={{ DDhobale } and { SBPatil } and { HSPatil }} , title={{MMS Steganography for Smartphone Devices "Computer Engineering and Technology (ICCET), 2 nd International Conference}} , year={April 2010} 4 } @incollection{b16, , title={{Classification Method of Jsteg Stego Images and F5 Stego-Images}} , author={{ QZhang } and { YLiu } and { SZhang } and { KChen }} , booktitle={{Fourth International Conference}} , year={Dec 2009} , note={Innovative Computing Information and control (ICICIC} } @book{b17, , author={{ SSarreshtedari } and { SGhaemmaghami }} , title={{High Capacity Image Steganography in Wavelet}} }