[1] Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T., “Digital watermarking and steganography,” 2nd Ed., Morgan Kaufmann, Burlington, 2007.
[2] Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Information hiding: A survey,” Proc. of the IEEE, Vol. 87, No. 7, July, 1999, pp. 1062–1078.
[3] Bohem, R., “Advanced statistical steganalysis,” Springer-Verlag Berlin Heidelberg, 2011.
[4] Wu, D. C., and Tsai, W. H, “A steganographic method for images by pixel value differencing,” Pattern Recognition Letters 24, 2003, pp. 1613–1626.
[5] Zhang, X., and Wang, S., “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security,” Pattern Recogn. Lett., Vol. 25, No. 3, 2004, pp. 331–339.
[6] Yang, C. H., Weng, C. Y., Wang, S. J., and Sun, H. M., “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Security, Vol. 3, No. 3, 2008, pp. 488–497.
[7] Kumar, V., and Muttoo, S. K., “A graph theoretic approach to digital steganography,” MIS Review, Vol. 17, No. 1, Sep. 2011, pp. 19-37.
[8] Hetzl, S. and Mutzel, P., “A graph-theoretic approach to steganography,” Proceedings of the 9th IFIP TC-6 TC-11 International Conference: Communications and Multimedia Security, Salzburg, Austria, Sep. 19-21, 2005, pp. 119-128.
[9] Gross, J. L., and Yellen, J., “Handbook of graph theory, ser. discrete mathematics and its applications,” CRC Press, Vol. 25, 2003.
[10] Crandall, R., “Some notes on steganography,” Posted on Steganography, http://os.inf.tu-dresden. de/˜westfeld/Crandall, pdf, 1998.
[11] Westf, A., eld, “High capacity despite better steganalysis (F5–A steganographic algorithm),” In: Moskowitz, I. S. (eds.): Information Hiding. 4 the International Workshop. Lecture Notes in Computer Science, Springer-Verlag, Berlin Heidelberg New York, Vol. 2137, 2001, pp. 289– 302.
[12] Al-Dmour, H., and Al-Ani, A., “A steganography embedding method based on edge identification and XOR coding,” Elsevier, Sience direct, Vol. 46, 2016., pp. 293-306.
[13] Mielikainen, J., “LSB matching revisited,” IEEE Signal Processing Letters, Vol. 13, No. 5, 2006, pp. 285-287.
[14] Luo, W., Huang, F., and Huang, J., “Edge adaptive image steganography based on LSB matching revisited,” IEEE Trans. Inf. Forensics Security, Vol. 5, No. 2, 2010, pp. 201–214.
[15] Mustafa, A. E., Elgamal, A. M. F., ElAlmi, M. E., and Ahmed, B. D., “A proposed algorithm for steganography in digital Image based on least significant bit,” Research Journal Specific Education Faculty of Specific Education, Mansoura University, No. 21, 2011, pp. 752-767.
[16] Shamalizade, M. A., Noroozi, Z. and Karami, M. R., “A new algorithm for embedding message in image steganography,” International Journal of Engineering Research and Technology, Vol. 3, No. 2, ISSN 2278–0181, Feb. 2014.