References
[1] N. Gupta, N. Sharma, “Hiding Image in Audio Using DWT and LSB”, International Journal of Computer Applications, Vol.81, No.2, pp. 11-14, 2013.
[2] R. Kaur, J. Bhatia, H.S. Saini, R. Kumar, “Multilevel Technique to Improve PSNR and MSE in Audio Steganography”, International Journal of Computer Applications. Vol.103. pp.1-4, 2014.
10.5120/18067-9008
[3] R. Kaur, A. Thakur, H.S. Saini, R. Kumar, "Enhanced Steganographic Method Preserving Base Quality of Information Using LSB, Parity and Spread Spectrum Technique", 2015 Fifth International Conference on Advanced Computing & Communication Technologies IEEE, pp.148 – 152, ISBN:978-1-4799-8487-9, 2015. DOI: 10.1109/ACCT.2015.139
[4] M. Nosrati, R. Karimi, M. Hariri, “Audio Steganography: A Survey on Recent Approaches”, World Applied Programming, Vol.2, No.3, pp.202-205, 2012.
[5] Sheelu, “Enhancement of Data Hiding Capacity in Audio Steganography”, IOSR Journal of Computer Engineering (IOSR- JCE), Vol.13, No.3, pp.30-35, 2013.
[6] N. Cvejic, T. Seppanen, “ Digital Audio Watermarking Technique and Technologies: Applications and Benchmarks”, Book 2007.
doi: 10.4018/978-1-59904-513-9
[7] F. E. M. Al-Obaid, A.J.M. Ali, “Which Bit is Better in the least Significant Bit”, Journal of information security (Scientific research publishing), Vol.6, No.3, pp.161-165, 2015.
doi: 10.4236/jis.2015.63017
[8] A. Singh, “ Self Study Seminar Report Steganography”, Department of Computer Technology, Delhi Technological University, Delhi
[9] C. R. Nagrecha, P. B. Swadas, “Audio Steganography with Various Compression Algorithms to Improve Robustness and Capacity”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol. 4, Issue 5, 243-247, 2014.
[10] T.H. Hiralal, N. Gopal, V.V. Sasikumar, “Audio Steganographic Approaches: A Review”, International Journal of Engineering and Innovative Technology (IJEIT), Vol. 4, Issue 11, pp.199-203, 2015
[11] P. Dutta, D. Bhattacharyya, T. H. Kim, “Data Hiding in Audio Signal: A Review”, International Journal of Database Theory and Applications, Vol.2, No.2, 2009.
[12] G. Nehru, P. Dhar, “A Detailed Look of Audio Steganography Techniques Using LSB and Genetic Algorithm Approach”, IJCSI International Journal of Computer Science Issues, Vol.9, No.2, pp. 402-406, 2012.
[13] P. Jayaram, H. R. Ranganatha, H.S. Anupama, “Information Hiding Using Audio Steganography –A Survey”, International Journal of Multimedia & Its Application, Vol.3, No.3, pp.86-96, 2011.
[14] S. Kumar, “LSB Modification and phase encoding technique of audio steganography revisited”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.1, No.4, pp.1-4, 2012.
[15] A.Binny, M. Koilakuntla, “Hiding secret information using LSB based audio steganography”, IEEE International Conference on Soft Computing & Machine Intelligence, pp.56-59, 2014.
doi: 10.1109/ISCMI.2014.24
[16] K. Kaur, D. Verma, “Multi-Level steganographic algorithm for audio steganography using LSB, parity coding and phase coding technique”, International Journal of Advanced Research In Computer Science and Software Engineering, Vol.4, No.1, 2014.
[17] P. Chandrakar, M. Choudhary, C. Badgaiyan, "Enhancement in the security of LSB based audio steganography using multiple files", International Journal of Computer Applications, Vol.73, No.7, pp.21-24, 2013.
[18] S. Divya, M. R. M. Reddy, “Hiding text in audio using multiple LSB steganography and provide security using cryptography”, International Journal of Science and Technology Research, Vol.1, No.6, 2012.
[19] A. Nagarajan, K.Alagarsamy, “An Enhanced Approach in Run Length Encoding Scheme (EARLE)”, International Journal of Engineering Trends and Technology, pp.43-48, 2011.
[20] S. Joseph , N. Srikanth , J. E. N. Abhilash, “A Novel Approach of Modified Run Length Encoding Scheme for High Speed Data Communication Application”, International Journal of Science and Research (IJSR), Vol.2, No.12, 2013.
[21] A. Ramachandran, A. K. Rajamohan, “Integrating Run Length Encoding and Column oriented database execution using Binary Search Tree”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 9, 2013.