[1] Rana, M. S., Sangwan, B. S., & Jangir, J. S. (2012). Art of Hiding: An Introduction to Steganography. International Journal of Engineering and Computer Science, 1(1), 11-23.
[2] Shukla, A. K., Kumar, R., Bajpai, R. P., & Bharadwaj, L. M. (2004). Data Hiding in Digital Images: A Review. In Procedings of the Pacific Rim Workshop on Digital Steganography, 2004 (pp. 186-190). ACROS Fukuoka, Fukuoka, Japan.
[3] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, Mar. 2010.
[4] K. Bailey and K. Curran, “An evaluation of image based steganography methods,” Multimed. Tools Appl., vol. 30, no. 1, pp. 55–88, Jun. 2006.
[5] S. Katzenbeisser and F. A. Petitcolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking, 1st ed. Norwood, MA, USA: Artech House, Inc., 2000.
[6] Singh, K. U. (2014). A Survey on Image Steganography Techniques. International Journal of Computer Applications, 97(18).
[7] Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
[8] Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34.
[9] C.-K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, Mar. 2004.
[10] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform,” in Intelligent Control and Innovative Computing, S. I. Ao, O. Castillo, and X. Huang, Eds. Springer US, 2012, pp. 395–404.
[11] A. Nissar and A. H. Mir, “Classification of Steganalysis Techniques: A Study,” Digit Signal Process, vol. 20, no. 6, pp. 1758–1770, Dec. 2010.
[12] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimed., vol. 8, no. 4, pp. 22–28, Oct. 2001.
[13] J. Fridrich and M. Goljan, “Practical Steganalysis of Digital Images - State of the Art,” in In Proceedings of SPIE, 2002, pp. 1–13.
[14] Wang, S., Yang, B., & Niu, X. (2010). A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), 28-35.
[15] Sharma, V. K., & Shrivastava, V. (2011). Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability. International Journal of Information and Communication Technology Research, 1(4).
[16] Mandal, J. K., & Khamrui, A. (2011). A Data Embedding Technique for Gray scale Image Using Genetic Algorithm (DEGGA). International Confrence on Electronic Systems (ICES-2011).
[17] G. Prema and S. Natarajan, “Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application,” in 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 727–730.
[18] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognit., vol. 34, no. 3, pp. 671–683, Mar. 2001.
[19] L. Yu, Y. Zhao, R. Ni, and T. Li, “Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm,” EURASIP J. Adv. Signal Process., vol. 2010, no. 1, p. 876946, Jun. 2010.
[20] H. R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,” Expert Syst. Appl., vol. 41, no. 14, pp. 6123–6130, Oct. 2014.
[21] D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, 1st ed. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1989.
[22] P. Sethi and V. Kapoor, “A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography,” Procedia Comput. Sci., vol. 87, pp. 61–66, 2016.
[23] J. H. Holland, Adaptation in Natural and Artificial Systems. Cambridge, MA, USA: MIT Press, 1992.
[24] Nosrati, M., & Karimi, R. (2011). A Survey on Usage of Genetic Algorithms in Recent Steganography Researches. World Applied Programming, 206-210.
[25] D. A. Coley, An Introduction to Genetic Algorithms for Scientists and Engineers. River Edge, NJ, USA: World Scientific Publishing Co., Inc., 1998.
[26] S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 2nd ed. Pearson Education, 2003.
[27] V. Arya, N. Garg, R. Khandekar, A. Meyerson, K. Munagala, and V. Pandit, “Local Search Heuristic for K-median and Facility Location Problems,” in Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing, New York, NY, USA, 2001, pp. 21–29.
[28] Anuradha Kasande and A.A. Agarkar, “An Enhancement in Quality of image & Anti- Steganalysis by Using Optimizing Image Steganography", IJEAT , 3(3) Feb. 2014.
[30] Skiena, S. S. (1998). The algorithm design manual: Text (Vol. 1). Springer Science & Business Media.
[31] A. Jaszkiewicz, “Genetic local search for multi-objective combinatorial optimization,” Eur. J. Oper. Res., vol. 137, no. 1, pp. 50–71, Feb. 2002.