[1] Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, and Brendan Halloran. Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335:299–326, 2019.
[2] Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt. Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3):727–752, 2010.
[3] Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Yamani Idna Bin Idris, Anthony TS Ho, and KiHyun Jung. Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65:46–66, 2018.
[4] Eugene T Lin and Edward J Delp. A review of data hiding in digital images. In PICS, volume 299, pages 274–278, 1999.
[5] Gyan Singh Yadav and Aparajita Ojha. Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability. Applied Soft Computing, 73:497–507, 2018.
[6] Gandharba Swain and Saroj Kumar Lenka. Classification of image steganography techniques in spatial domain: a study. Journal of Computer Science & Engineering Technology (IJCSET), 5(03):219–232, 2014.
[7] S Arunkumar, V Subramaniyaswamy, V Vijayakumar, Naveen Chilamkurti, and R Logesh. Svd-based robust image steganographic scheme using riwt and dct for secure transmission of medical images. Measurement, 139:426–437, 2019.
[8] Manashee Kalita and Themrichon Tuithung. A comparative study of steganography algorithms of spatial and transform domain. International Journal of Computer Applications, 975:8887, 2016.
[9] Katzenbeisser Stefan, Petitcolas Fabien AP, et al.Information hiding techniques for steganography and digital watermarking. 2000.
[10] Shiv K Sahu, Shachi Sahu, Vahid Nourani, Chief Advisory Board, Uma Shanker, Rama Shanker, Vinita Kumari, Kapil Kumar Bansal, Deepak Garg, Vijay Anant Athavale, et al.Untitled-international journal of engineering and advanced.
[11] St´ephane Mallat. A wavelet tour of signal processing. Elsevier, 1999.
[12] Ingrid Daubechies. Ten lectures on wavelets.SIAM, 1992.
[13] Aparna Vyas and Joonki Paik. Review of the application of wavelet theory to image processing. IEIE Transactions on Smart Processing and Computing, 5(6):403–417, 2016.
[14] Inas Jawad Kadhim, Prashan Premaratne, and Peter James Vial. High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cognitive Systems Research, 60:20–32, 2020.
[15] KB Raja, Kiran Kumar, Satish Kumar, MS Lakshmi, H Preeti, KR Venugopal, and Lalit M Patnaik. Genetic algorithm based steganography using wavelets. In International Conference on Information Systems Security, pages 51–63. Springer, 2007.
[16] Elham Ghasemi, Jamshid Shanbehzadeh, and Nima Fassihi. High capacity image steganography based on genetic algorithm and wavelet transform. In Intelligent Control and Innovative Computing, pages 395–404. Springer, 2012.
[17] Avinash K Gulve and Madhuri S Joshi. An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Mathematical Problems in Engineering, 2015, 2015.
[18] Hayat Al-Dmour and Ahmed Al-Ani. A steganography embedding method based on edge identification and xor coding. Expert systems with Applications, 46:293–306, 2016.
[19] Aref Miri and Karim Faez. Adaptive image steganography based on transform domain via genetic algorithm. Optik, 145:158–168, 2017.
[20] Aref Miri and Karim Faez. An image steganography method based on integer wavelet transform. Multimedia Tools and Applications, 77(11):13133–13144, 2018.
[21] Sabyasachi Pramanik, RP Singh, and Ramkrishna Ghosh. Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimedia Tools & Applications, 79, 2020.
[22] Pranab K Muhuri, Zubair Ashraf, and Swati Goel. A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Applied Soft Computing, 92:106257, 2020.
[23] Hamidreza Rashidy Kanan and Bahram Nazeri. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert systems with applications, 41(14):6123–6130, 2014.
[24] Ran-Zan Wang, Chi-Fang Lin, and Ja-Chen Lin. Image hiding by optimal lsb substitution and genetic algorithm. Pattern recognition, 34(3):671–683, 2001.
[25] Pratik D Shah and RS Bichkar. A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In International Conference on Intelligent Computing and Applications, pages 119–129. Springer, 2018.
[26] Ranyiah Wazirali, Waleed Alasmary, Mohamed MEA Mahmoud, and Ahmad Alhindi. An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access, 7:133496–133508, 2019.
[27] Lifang Yu, Yao Zhao, Rongrong Ni, and Zhenfeng Zhu. Pm1 steganography in jpeg images using genetic algorithm. Soft Computing, 13(4):393–400, 2009.
[28] V Sabeti, S Faiazi, and H Shirinkhah. Improving security of lsbm steganography using of genetic algorithm, mmulti-key and blocking. 2020.
[29] Rinita Roy and Sumit Laha. Optimization of stego image retaining secret information using genetic algorithm with 8-connected psnr. Procedia Computer Science, 60:468–477, 2015.
[30] Amrita Khamrui, Diotima Dutta Gupta, Shatadal Ghosh, and Sambhunath Nandy. A spatial domain image authentication technique using genetic algorithm. In International Conference on Computational Intelligence, Communications, and Business Analytics, pages 577–584. Springer, 2017.
[31] SI Nipanikar, V Hima Deepthi, and Nikita Kulkarni. A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alexandria engineering journal, 57(4):2343–2356, 2018.
[32] Sahib Khan and Tiziano Bianchi. Ant colony optimization (aco) based data hiding in image complex region. International Journal of Electrical & Computer Engineering (2088-8708), 8(1), 2018.
[33] Anan Banharnsakun. Artificial bee colony approach for enhancing lsb based image steganography. Multimedia Tools and Applications, 77(20):27491–27504, 2018.
[34] Chun-Hsien Chou and Yun-Chin Li. A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Transactions on circuits and systems for video technology, 5(6):467–476, 1995.
[35] Tom´aˇs Pevny, Patrick Bas, and Jessica Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on information Forensics and Security, 5(2):215–224, 2010.