1. Awasthi M, Lodhi H (2013) Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition. Adv Electron Electr Eng 3(8):971–976
2. Bender W, Gruhl D, Morimoto N, Lou A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313–336
3. Chellappa R, Theodoridis S (2014) Academic press library in signal processing: signal processing theory and machine learning. 1
4. Craver S (1997) On public-key steganography. In: The Presence of an Active Warden Technical Report RC 20931, IBM
5. NHS Executive (2001) Information for Health: An Information Strategy for the Modern NHS 1998–2005. Wetherby: Department of Health Publications; 1998 and NHS Executive. Building the Information Core - Implementing the NHS Plan. London: Department of Health