References Kumar, R., Chand, S. & Singh, S. (2016). A High Capacity Email Based Text Steganography Scheme Using Huffman Compression. In: Proc. of the International Conf. on Signal Processing and Integrated Networks, Noida, India, pp. 53-56. Kumar, V., Bansal , A. & Muttoo , S. K. (2014). Data Hiding Method Based on Inter-Block Difference in Eight Queens Solutions and LSB Substitution. International Journal of Information Security and Privacy, (IGI Global), Vol. 8(2), pp. 55-68. Lai, Y.-C. & Tsai, W.-H. (2009). Covert Communication Via PDF Files by New Data Hiding Techniques. Department of Computer Science, National Chiao Tung University, Hsinchu , Taiwan, This work was supported by NSC project No. 97-2631- H-009-001, 2009. Lee I-S. & Tsai W.-H. (2010). A New Approach to Covert Communication via PDF Files. Signal Processing, Vol. 90, No. 2, pp. 557-565. Li, B., Wang, M., Li, X., Tan, S., & Huang, J. (2015, Sept.). A Strategy of Clustering Modification Directions in Spatial Image Steganography. in IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1905-1917, doi : 10.1109/TIFS.2015.2434600. Lingyun , X., Wenshuai , W., Xu , L., & Chunfang , Y. (2018). A Linguistic Steganography Based on Word Indexing Compression and Candidate Selection. Multimedia Tools And Applications, 77(21), pp 28969–28989. Liu, H., Li, L., Li, J., & Huang, J. (2011). Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. https://link.springer.com/chapter/10.1007%2F978-3-642-32205-1_15. Mahato , S., Ali Khan, D., Yadav , D. K. (2017, February). A Modified Approach to Data Hiding In Microsoft Word Documents by Change-Tracking Technique. Journal of King Saud University - Computer and Information Sciences, Vol. 32(2), pp. 216-224, https://doi.org/10.1016/j.jksuci.2017.08.004. Malik, A., Sikka , G., & Verma , H. K. (2017, February). A High Capacity Text Steganography Scheme Based on LZW Compression and Color Coding. Engineering Science and Technology, an International Journal, Vol. 20(1),pp. 72-79, https://doi.org/10.1016/j.jestch.2016.06.005. Naqvi , N., Abbasi , A. T., Hussain , R. M., Khan, A., & Ahmad, B. (2018). Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach. Wireless Personal Communications, , 2018 [90], pp. 1-23. Rakesh , R., Devathi , S., Sekaran , P. S. C., & Kumar, S. S. (2011, May). Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble. International Journal of Computer Applications, Vol. 22(3). Ramana,K . V., Babu , B.R. & Babu , R. (2011, May). A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security. International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 5. Ramanpreet , K. & Singh, B. (2012). Survey and Analysis of Various Steganographic Techniques. International Journal of Engineering Science & Advanced Technology. vol. 2, no. 3, pp. 561-566. Ren , W., Liu,Y . & Zhao, J. (2012, June). Provably Secure Information Hiding via Short Text in Social Networking Tools. Tsinghua Science and Technology, ISSN 1007-0214 1/18 pp. 225-231, Vol. 17(3). . Satir , E. & Isik , H. (2012). A Compression-Based Text Steganography Method. Journal of Systems and Software, Vol. 85, No. 10, pp. 2385-239. Schonfeld , D. & Winker, A. (2007). Reducing the Complexity of Syndrome Coding for Embedding. In: Furon T., Cayre F., Doerr G., Bas P. ( eds ) Information Hiding. IH 2007, LNCS 4567, pp. 145-158. Sheisi , H., Mesgarian , J. & Rahmani , M. (2012, August). Steganography: Dct Coefficient Replacement Method and Compare with JSteg Algorithm. International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp. 458-462. Shniperov , A. N. & Nikitina , K. A. (2016). A Text Steganography Method Based on Markov Chains. Automatic Control and Computer Sciences, Vol. 50, No. 8, pp. 802–808. Singh, P., & Raman, B. (2017). Reversible Data Hiding Based on Shamir’s Secret Sharing for Color Images over Cloud. Information Sciences. Vol 422, pp. 77-97. http://dx.doi.org/10.1016/j.ins.2017.08.077 Sloan, T. & Castro, J. H. (2018). Dismantling OpenPuff PDF Steganography. Digital Investigation, Vol. 25, pp. 90-96. Stephane G. R., Ekodeck , R. & Ndoundam (2016, August) . PDF Steganography Based on Chinese Remainder Theorem. Journal of Information Security and Applications, Vol. 29, pp. 1-15, https://doi.org/10.1016/j.jisa.2015.11.008. Wu, D.-C. & Tsai, W.-H. (2003). A Steganographic Method for Images by Pixel Value Differencing, Pattern Recognition Letters 24, pp. 1613–1626. Wua , X. & Yang, C.-N. (2019). A Combination of Color -Black-and-White Visual Cryptography and Polynomial Based Secret Image Sharing. Journal of Visual Communication and Image Representation, Vol. 61, pp.74-84. Yadav V. K. & Batham S. (2015). A Novel Approach of Bulk Data Hiding using Text Steganography. Procedia Computer Science, Vol. 57, pp. 1401-1410. Zhong , S., Cheng, X. & Chen, T. (2007, January). Data Hiding in a Kind of PDF Texts for Secret Communication. International Journal of Network Security, Vol.4 (1) pp.17-26 40