T. Moerland, “Stegnography and Steganalysis,” Leiden Institute of Advanced Computing Science, 2003. www.liacs.nl/home/ tmoerl/privtech.pdf
 T. Handel and M. Sandford, “Hiding Data in the OSI Network Model,” Proceedings of the 1st International Workshop on Information Hiding, Vol. 1174, 1996, pp. 23-38. http://dx.doi.org/10.1007/3-540-61996-8_29
 K. Solanki, K. Sullivan and U. Madhow, Eds., “Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes,” Lecture Notes in Computer Science, Vol. 5284, 2008, pp. 60-71.
 R. J. Anderson and F. A. P. Petitcolas, “On the Limits of Stegnography,” IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 474-481. http://dx.doi.org/10.1109/49.668971
 R. Crandall, “Some Notes on Stegnography,” Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/westfeld/crandall.pdf
 K. Cabeen and P. Gent, “Image Compression and Discrete Cosine Transform,” College of Redwoods. http://online.redwoods.cc.ca.us/instruct/darnold/LAPROJ/Fall98/PKen/dct.pdf
 J. Fridrich, M. Goljan and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images,” Magazine of IEEE Multimedia, Special Issue on Multimedia and Security, Vol. 8, No. 4, 2001, pp. 22-28.
 J. Bierbrauer and J. Fridrich, “Constructing Good Covering Codes for Applications in Stegnography,” Transactions on Data Hiding and Multimedia Security, Springer, Heidelberg, 2007. http://www.math.mtu.edu/jbierbra/
 N. Deshpande, K. Sneha and D. Jacobs, “Implementation of LSB Stegnography and Its Evaluation for Various Bits,” 1st International Conference on Digital Information Management, Bangalore, 6 December 2006, pp. 173-178. http://dx.doi.org/10.1109/ICDIM.2007.369349
 M. Chaumont and W. Puech, “DCT-Based Data Hiding Method to Embed the Color Information in a JPEG Grey Level Image,” 14th European Signal Processing Conference (EUSIPCO 2006), Florence, 4-8 September, 2006.
 K. Wong, X. J. Qi and K. Tanaka, “A DCT Based Mod4 Stegnography Method,” Signal Processing, Vol. 87, No. 6, 2007, pp. 1251-1263. http://dx.doi.org/10.1016/j.sigpro.2006.10.014
 C.-T. Tsai, C. Liaw, Y.-H. Liao and C.-H. Ko, “Concealing Information in Image Mosaics Based on Tile Image Features,” Journal of the Chinese Institute of Engineers, Vol. 34, No. 3, 2011, pp. 429-440. http://dx.doi.org/10.1080/02533839.2011.565618
 D. Bhattacharyya, T.-H. Kim and P. Dutta, “A Method of Data Hiding in Audio Signal,” Journal of the Chinese Institute of Engineers, Vol. 35, No. 5, 2012, pp. 523-528.
 S. Khan, M. H. Yousaf and M. J. Akram, “Implementation of Variable Least Significant Bits Stegnography Using Decreasing Distance Decreasing Bits Algorithm,” International Journal of Computer Science Issues, Vol. 8, No. 6, 2011.
 S. Khan and M. H. Yousaf, “Implementation of VLSB Stegnography Using Modular Distance Technique,” Innovations and Advances in Computer, Information, Systems Sciences, and Engineering Lecture Notes in Electrical Engineering, Vol. 152, 2013, pp. 511-525. http://dx.doi.org/10.1007/978-1-4614-3535-8_43