Hendrych, J., & Ličev, L. (2020). Advanced methods of detection of the steganography
content. Lecture Notes in Electrical Engineering, 554, 484–
493. https://doi.org/10.1007/978-3-030-554-1_12
Jiang, C., Pang, Y., & Xiong, S. (2014). A high capacity steganographic method based
on quantization table modification and F5 algorithm. Circuits, Systems, and
Signal Processing, 33(5), 1611–1626. https://doi.org/10.1007/s00034-014-
9739-z
Lin, C.-H., Hong, W., & Su, G.-Z. (2024). Adaptive sorting-based data hiding scheme
for JPEG images. Lecture Notes in Electrical Engineering, 1217, 288–
293. https://doi.org/10.1007/978-3-030-1217-1_23
Lu, C., Wang, H., & Li, S. (2015). Optimized quantization tables for DCT-based
steganography. Multimedia Tools and Applications, 71, 12641–
12670. https://doi.org/10.1007/s11042-014-2410-7
Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. (1999). Information hiding--a
survey. Proceedings of the IEEE, 87(7), 1062–
1078. https://doi.org/10.1109/5.771065
Sabeti, V., & Aghabagheri, A. (2023). Developing an adaptive DCT-based
steganography method using a genetic algorithm. Multimedia Tools and
Applications, 82(13), 19323–19346. https://doi.org/10.1007/s11042-023-
123456
Solak, S., Abdirashid, A. M., Adjevi, A., & Sahu, A. K. (2024). Robust data hiding
method based on frequency coefficient variance in repetitive
compression. Engineering Science and Technology, an International
Journal, 56. https://doi.org/10.1016/j.jestch.2024.123456
Tchakounté, F., Kamdem, P. C., Kamgang, J. C., Tchapgnouo, H. B., & Atemkeng, M.
(2020). An efficient DCT-SVD steganographic approach applied to JPEG
images. EAI Endorsed Transactions on Industrial Networks and Intelligent
Systems, 7(24), 1–13. https://doi.org/10.4108/eai.123456
Wallace, G. K. (1991). The JPEG still picture compression standard. Communications
of the ACM, 34(4), 30–44. https://doi.org/10.1145/103085.103089
Wang, K., Lu, Z.-M., & Hu, Y.-J. (2013). A high capacity lossless data hiding scheme
for JPEG images. Journal of Systems and Software, 86(7), 1965–
1975. https://doi.org/10.1016/j.jss.2013.03.123
Westfeld, A. (2001). F5-a steganographic algorithm high capacity despite better
steganalysis. Lecture Notes in Computer Science, 2137, 289–
302. https://doi.org/10.1007/3-540-45496-9_21
Xie, X.-Z., Chang, C.-C., & Horng, J.-H. (2021). An EMD-based data hiding scheme
for JPEG images. Connection Science, 33(3), 515–
531. https://doi.org/10.1080/09540091.2021.123456
Zeng, X., Feng, B., Xia, Z., Peng, Z., Qin, T., & Lu, W. (2024). Robust image hiding
network with frequency and spatial attentions. Pattern
Recognition, 155. https://doi.org/10.1016/j.patcog.2024.123456