1. [1] شمع علیزاده بایی محمدعلی، "بررسی الگوریتمهای مخفیسازی پیام در نهاننگاری تصویر و طراحی الگوریتمی کارآمد"، مهندسی شناورهای تندرو، شماره 52، صفحات 42-30، 1397.
2. [1] M. SH. Alizadeh, "Evaluation of message hiding algorithms in image steganography and efficient algorithm design", High Speed Craft, Vol. 52, pp. 42-30, 2018.
3. [2] X. Zhang, Z. Zhao, and J. Wang, "Chaotic image encryption based on circular substitution box and key stream buffer", Signal Process. Image Commun., vol. 29, no. 8, pp. 902-913, 2014. [
DOI:10.1016/j.image.2014.06.012]
4. [3] M. Hussain and M. Hussain, "A Survey of Image Steganography Techniques," vol. 54, pp. 113-124, 2013.
5. [4] A.Benoraira, K. Benmahammed, and N. Boucenna, "Blind image watermarking technique based on differential embedding in DWT and DCT domains," EURASIP J. Adv. Signal Process., vol. 2015, no. 1, pp. 1-11, 2015. [
DOI:10.1186/s13634-015-0239-5]
6. [5] H. Tao, L. Chongmin, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," J. Appl. Res. Technol., vol. 12, no. 1, pp. 122-138, 2014. [
DOI:10.1016/S1665-6423(14)71612-8]
7. [6] N. A. Abbas, "Image watermark detection techniques using quadtrees," Appl. Compute Informatics, vol. 11, no. 2, pp. 102-115, 2015. [
DOI:10.1016/j.aci.2014.07.003]
8. [7] M. Keyvanpour and F. M. Bayat, "Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the {DWT} domain," Math. Compute. Model, vol. 58, no. 1-2, pp. 56-67, 2013. [
DOI:10.1016/j.mcm.2012.07.008]
9. [8] Z. Xie and X. Wang, "A Heuristic Feature Combination Selection Method in Fusion Detection of JPEG Stegoimages," in 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012, pp. 220-224. [
DOI:10.1109/MINES.2012.22] [
PMID]
10. [9] M. Kiamini, S. Fazli , " A High Performance Steganographic Method using JPEG and PSO Algorithm," IEEE, 2008.
11. [10] F. Sadeghi, M. K. Rafsanjani, and F. Z. Kermani, "Hiding Information in Image by Compound Meta-Heuristic Algorithm PSO-SA," Int. J. Compute Sci. Artif. Intell, vol. 3, no. 4, p. 125, 2013. [
DOI:10.5963/IJCSAI0304001]
12. [11] K. Akshyata and l. Jain, "Data Hiding and Security using Steganography", International Journal of Engineering and Management Research, 2017.
13. [12] E. T. Zghaer and S. H. Hashem, "Ant Colony Optimization To Enhance Image Steganography", International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), 2017.
14. [13] A. Miri, K. Faez, "Adaptive image steganography based on transform domain via genetic algorithm", Optik, vol. 145, pp.158-168. [
DOI:10.1016/j.ijleo.2017.07.043]
15. [14] K. Loukhaoukha, J.-Y. Chouinard, and M. H. Taieb, "Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization," J. Inf. Hiding Multimed. Signal Process., vol. 2, no. 4, pp. 303-319, 2011.
16. [15] J. S. Lee, J.-W. Wang, and K.-Y. Giang, "A new image watermarking scheme using multi-objective bees algorithm," Appl. Math. Inf. Sci., vol. 8, no. 6, p. 2945, 2014. [
DOI:10.12785/amis/080632]
17. [16] F. G. Mohammadi and M. S. Abadeh, "Image steganalysis using a bee colony based feature selection algorithm," Eng. Appl. Artif. Intell., vol. 31, pp. 35-43, 2014. [
DOI:10.1016/j.engappai.2013.09.016]
18. [17] M. Ali and C. W. Ahn, "An optimal image watermarking approach through cuckoo search algorithm in wavelet domain," Int. J. Syst. Assur. Eng. Manag., pp. 1-10, 2014.
19. [18] Y. H. Chen and H. C. Huang, "Reversible Image Watermarking Based on Genetic Algorithm," in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, 2014, pp. 21-24. [
DOI:10.1109/IIH-MSP.2014.13]
20. [19] a L. Brazil, a Sanchez, a Conci, and N. Behlilovic, "Hybridizing genetic algorithms and path relinking for steganography," ELMAR 2011 Proc., no. September, pp. 285-288, 2011.
21. [20] M. Nosrati, A. Hanani, and R. Karimi, "Steganography in Image Segments Using Genetic Algorithm," in 2015 Fifth International Conference on Advanced Computing Communication Technologies, 2015, pp. 102-107. [
DOI:10.1109/ACCT.2015.57]
22. [21] B. Lei, F. Zhou, E.-L. Tan, D. Ni, H. Lei, S. Chen, and T. Wang, "Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform," Signal Processing, vol. 113, pp. 80-94, 2015. [
DOI:10.1016/j.sigpro.2014.11.007]
23. [22] X. Li and J. Wang, "A steganographic method based upon {JPEG} and particle swarm optimization algorithm," Inf. Sci. (Ny)., vol. 177, no. 15, pp. 3099-3109, 2007. [
DOI:10.1016/j.ins.2007.02.008]
24. [23] G. S. Lin, Y. T. Chang, and W. N. Lie, "A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm," IEEE Trans. Multimed., vol. 12, no. 5, pp. 345-357, Aug. 2010. [
DOI:10.1109/TMM.2010.2051243]
25. [24] A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, "Optimized gray-scale image watermarking using DWT--SVD and Firefly Algorithm," Expert Syst. Appl., vol. 41, no. 17, pp. 7858-7867, 2014. [
DOI:10.1016/j.eswa.2014.06.011]
26. [25] A. Miri, K. Faez, "Adaptive image steganography based on transform domain via genetic algorithm", Optik, vol. 145, pp.158-168. [
DOI:10.1016/j.ijleo.2017.07.043]
27. [26] S. Hemalatha, U. D. Acharya, and A. Renuka, "Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image," Procedia Comput. Sci., vol. 47, pp. 272-281, 2015. [
DOI:10.1016/j.procs.2015.03.207]
28. [27] M. Nosrati, A. Hanani, and R. Karimi, "Steganography in Image Segments Using Genetic Algorithm," in 2015 Fifth International Conference on Advanced Computing Communication Technologies, 2015, pp. 102-107. [
DOI:10.1109/ACCT.2015.57]
29. [28] Z. Li, Y. Hi, "Steganography with pixel-value differencing and modulus function based on PSO," Information Security and Applications, vol.43, pp. 47-52, 2018. [
DOI:10.1016/j.jisa.2018.10.006]
30. [29] F. G. Mohammadi , H. sajedi, "Region based Image Steganalysis using Artificial Bee Colony," Visual Communication and Image Representation, vol 14, pp. 214-226, 2017. [
DOI:10.1016/j.jvcir.2016.12.003]
31. [30] S.I. Nipanikar, V. H. Deepthi, N. Kulkarni, "A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform," Alexandria Engineering, vol. 57, pp. 2343-2356, 2018. [
DOI:10.1016/j.aej.2017.09.005]
32. [31] A. Miri, k. Faez, "Adaptive image steganography based on transform domain via genetic algorithm," Optik, vol. 145, pp. 158-168, 2017. [
DOI:10.1016/j.ijleo.2017.07.043]
33. [32] CM.Wang, NI. Wu, CS. Tsai, "A high quality steganographic method with pixel-value differencing and modulus function", J Syst Softw, Vol. 81, pp.150-158, 2008. [
DOI:10.1016/j.jss.2007.01.049]
34. [33] CH. Yang, SJ. Wang, C. Weng, "Capacity-raising steganography using multi- -pixel differencing and pixel-value shifting operations", Fundam Informaticae, Vol. 98, pp.321-336, 2010. [
DOI:10.3233/FI-2010-229]
35. [34] X. Liao, QY. Wen, ZL. Zhao, "A novel steganographic method with four-pixel differencing and modulus function", Fundam Informaticae, Vol. 118, pp. 281-289, 2012. [
DOI:10.3233/FI-2012-714]
36. [35] M. Hussain, AWA. Wahab, ATS. Ho, "A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement", Signal Pro- cess Image Commun, Vol. 50, pp.44-57, 2017. [
DOI:10.1016/j.image.2016.10.005]
37. [36] Li. Zhaotong, He.Ying, "Steganography with pixel-value differencing and modulus function based on PSO", Journal of Information Security and Applications, vol. 43, pp. 47-52, 2018. [
DOI:10.1016/j.jisa.2018.10.006]