[1] Kadhim, I. J.; Premaratne, P.; Vial, P. J.; “Improved Image Steganography Based on Super-Pixel and Coefficient-Plane-Selection”; Signal Process. 2020, 171, 107481.##
[2] Kadhim, I. J.; Premaratne, P.; Vial P. J.; Halloran, B.; “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research”; Neurocomputing 2018, 335, 299-326.##
[3] Luo, W.; Huang, F.; Huang, J.; “Edge Adaptive Image Steganography Based on LSB Matching Revisited”; IEEE Trans. Inf. Forensics Secur. 2010, 5, 201-214.##
[4] Hong, W.; Chen, T. S.; “A Novel Data Embedding Method using Adaptive Pixel Pair Matching”; IEEE Trans. Inf. Forensics Secur. 2011, 7, 176-184.##
[5] Hussain, M.; Abdul Wahab, A. W.; Ho, A. T. S.; Javed, N.; Jung, K. H.; “A Data Hiding Scheme Using Parity-Bit Pixel Value Differencing and Improved Rightmost Digit Replacement”; Signal Process. Image Commun. 2017, 50, 44-57.##
[6] Liao, X.; Qin, Z.; Ding, L.; “Data Embedding in Digital Images Using Critical Functions”; Signal Process. Image Commun. 2017, 58, 146–156,##
[7] Chen, J.; “A PVD-Based Data Hiding Method with Histogram Preserving Using Pixel Pair Matching”; Signal Process. Image Commun. 2014, 29, 375–384.##
[8] Shen, S. Y.; Huang, L. H.; “A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions”; Comput. Secur. 2015, 48, 131–141.##
[9] Hong, W.; Chen, T. S.; Luo, C. W.; “Data Embedding Using Pixel Value Differencing and Diamond Encoding with Multiple-Base Notational System”; J. Syst. Soft. 2012, 85, 1166–1175.##
[10] Rabie, T.; Kamel, I.; “High-Capacity Steganography: A Global-Adaptive-Region Discrete Cosine Transform Approach”; Multimed. Tools Appl. 2017, 76, 6473–6493.##
[11] Rabie, T.; Baziyad, M.; Kamel, I.; “Enhanced High Capacity Image Steganography Using Discrete Wavelet Transform and the Laplacian Pyramid”; Multimed. Tools Appl. 2018, 77, 23673-23698.##
[12] Di, F.; Zhang, M.; Liao, X.; Liu, J.; “High-Fidelity Reversible Data Hiding by Quadtree-Based Pixel Value Ordering”; Multimed. Tools Appl. 2018, 78, 7125-7141.##
[13] Al-Qershi, O. M.; Khoo, B. E.; “Controlling Hiding Capacity Using Image Characteristics with a 2D-DE Data Hiding Scheme”; AEU-Int. J. Electron C. 2014, 68, 346–350.##
[14] Ghosal, S. K.; Mandal, J. K.; Sarkar, R.; “High Payload Image Steganography Based on Laplacian of Gaussian (LoG) Edge Detector”; Multimed.Tools Appl. 2018, 77, 30403-30418.##
[15] Atta, R.; Ghanbari, M.; “A High Payload Steganography Mechanism Based on Wavelet Packet Transformation and Neutrosophic Set”; J. Vis. Commun. Image R. 2018, 35, 42-54.##
[16] Gaurav, K; Ghanekar, U.; “Image Steganography Based on Canny Edge Detection, Dilation Operator and Hybrid Coding”; J. Inf. Secur. Appl. 2018, 41, 41-51.##
[17] Atee, H. A.; Ahmad, R.; Noor, N. M.; Rahma, A. M. S.; Aljeroudi, Y.; “Extreme Learning Machine Based Optimal Embedding Location Finder for Image Steganography”; PLoS ONE 2017, 12, 1-23.##
[18] Roy, R.; Laha, S.; “Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-Connected PSNR”; Proc. Comput. Sci. 2015, 60, 468–477.##
[19] Ghaleb Al-Jbara, H. A.; Mat Kiah, L. B.; Jalab, H. A.; “Increased Capacity of Image Based Steganography Using Artificial Neural Network”; AIP Conf. Proc. 2012, 1482 , 20–25.##
[20] Nipanikar, S. I.; Deepthi, V. H.; Kulkarni, N.; “A Sparse Representation Based Image Steganography Using Particle Swarm Optimization and Wavelet Transform”; Alex. Eng. J. 2017, 57, 2343-2356.##
[21] Rao, R. V.; Savsani, V. J.; Vakharia, D. P.; “Teaching–Learning-Based Optimization: A Novel Method for Constrained Mechanical Design Optimization Problems”; Comput. Aided Des. 2011, 43, 303-315.##
[22] Ker, A.; “Steganalysis of LSB Matching in Grayscale Images”; IEEE Signal Process. Lett. 2005, 12, 441–444.##
[23] Huang, F.; Li, B.; Huang, J.; “Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels”; Proc. IEEE ICIP 2007, 1, 401-404.##
[24] Cancelli, G.; Doerr, G.; Cox, I. J.; Barni, M.; “Detection of ±1 LSB Steganography Based on the Amplitude of Histogram Local Extrema”; IEEE Int. Con. Image Process. 2008, 1288-1291.##
[25] Sabeti, V.; Samavi, S; Shirani, S.; “An Adaptive LSB Matching Steganography Based on Octonary Complexity Measure”; Multimed. Tools Appl. 2013, 64, 777-793.##
[26] Shah, P. D.; Bichkar, R. S; “A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator”; Int. Con. Intelli. Comput. Appl. 2018, 119-129.##
[27] Wazirali, R.; Alasmary, W.; Mahmoud, M. M; Alhindi, A.; “An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms”; IEEE Acc. 2019, 7, 133496-133508.##
[28] Shah, P.D.; Bichkar, R.S.; “Genetic Algorithm Based Imperceptible Spatial Domain Image Steganography Technique with High Payload Capacity”; Int. J. Rec. Tech. Eng. (IJRTE), 2019, 224-229.##
[29] Sabeti, V.; Faiazi, S.; Shirinkhah, H.; “Improving Security of LSBM Steganography by Using of Genetic Algorithm, Multi-Key and Blocking”; Iranian J. Elec. Comp. Eng., 2020, 78, 49-58. (In Persian)##