[1] P. N. Shingote, A. Bhujbal, P. M. Syed, Advanced Security Usin Cryptographyand LSBMatching Steganography, IJCER, 3(2), 52-55, 2014
[2] F. G. Mohammadi, M. S. Abadeh, Image steganalysis using a bee colony based feature selection algorithm., Engineering Applications of Artificial Intelligence, 2014
[3] Z. V. Patel, S. A. Gadhiya,.A Survey Paper on Steganography and Cryptography, International Multidisciplinary Research Journal (RHIMRJ), Volume-2, Issue-5. 2015
[4] Y. Wang, X. Liu, Z. Gao, “Chaos‑Based Image Steganography,” IEEE Internet Things J., vol. 10, no. 2, pp. 1478–1487, 2023.
[5] M. Juneja, P. S. Sandhu, Improved LSB based Steganography Techniques for ColorImages in Spatial Domain. IJ Network Security, 16(4),366376, 2014
[6] Y. Wang et al., “Chaos‑Based Image Steganography,” IEEE IoT J., 2023.
[7] R. C. Gonzalez, R. E. Woods, Digital Image Processing translator: Ainullah Jafarnjad Qomi, publisher: Computer Science Publications, 4th edition, 2021
[8] H. Sajedi and Sh. R. Yaghoubi, “Review on Steganographic Methods in Texts”, 2018.
[9] D. Gomez, R. Martinez, J. Lopez, “LSTM‑Assisted Data Hiding in Color Images,” IEEE Access, vol. 10, pp. 109123–109135, 2022.
[10] S. M Hosseininia, A. Nemati, Investigation of image-based information encryption methods with the approach of increasing the security of information and communications against multiple attacks, Specialized Scientific Quarterly of New Technologies in Electrical and Computer Engineering, Volume 3, Number 4, 2022[11] T. Nguyen, P. Tran, H. Huynh, “Deep LSTM‑Based Image Steganography,” IEEE Access, vol. 9, pp. 87632–87645, 2021.
[12] N. Patel, M. Patel, K. Joshi, “Robust Steganographic System Using Autoencoders,” IEEE Trans. Inf. Forensics Secur., vol. 18, pp. 220–233, 2022.
[13] A. Sabhany, A. Ahmed, H. Ali, R. Mokhtar, “Digital audio steganography: Systematic review,” classification, and analysis of the current state of the art. Computer Science Review, Volume 38, November 2020
[14] D. Wenbo, Z. Mingyuan, Y. Wen, P. Matjaž, W. Dapeng. “The networked evolutionary algorithm: A network science perspective” , Applied Mathematics and Computation, Volume 338, Pages 33-43. 1 December 2018
[15] E. Asadzadeh, M. Asadzadeh, M. Asadbek Genetic Algorithm, the First Publications, 2018[16] A. R. Mirqadari and A. Jolfaei, "A new scheme for image encryption using chaotic mappings," Modern Defense Sciences and Technologies (Non-Agent Defense Sciences and Technologies), vol. 2, no. 2 (series 4), pp. 111-124, 2019