Katzenbeisser, "A survey of steganographic
techniques," in Information hiding, 2000, pp.
Liu, "A high payload steganographic
algorithm based on edge detection," Displays, vol.
Tseng, "A steganographic
method for digital images using side match," Pattern Recognition Letters, vol.
technique proposed in this study uses 2nd bit plane substitution by secret message and then TPVD embedding over remaining 7-bit image to increase payload.
McAfee noted (http://www.ibtimes.com/growing-cyberthreat-steganographic-malware-hiding-images-2555102) increased incidents of steganographic
malware , which involves embedding a secret algorithm within an image.
At steganographing the confidential information (CI) or a digital watermark  (DWM) after preliminary coding, which result is the additional information (AI), as a rule, presented as the binary sequence, enwraps into a container using steganographic
algorithm which in the presented work the digital image (DI) is used.
"Our business is to leverage emerging technologies, such as blockchain, crypto and steganographic
techniques, but in a way that is simple and intuitive for end users," said co-founder Steve Cook.
These include steganographic
approaches, multibiometric recognition, two-factor authentication, sample replay prevention, and sensor and sample authentication.
An Adaptive Image Steganographic
Model Based on Minimum-Error LSB Replacement, [Online].
This downloader now delivers other malware via steganographic
Maybe the image was hiding some kind of steganographic
code -- of the sort used by foreign spies and our future alien overlords!