1. Anderson R, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481
2. Cai K, Li X, Zeng T, et al (2010) Reliable histogram features for detecting LSB matching. In: Proceedings of IEEE international conference on image processing, pp 26–29
3. Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. In: Proceedings of IEEE international conference on innovative computing information and control, pp 17–17
4. Chao RM, Wu HC, Lee CC, et al (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:658047
5. Felgenhauer B, Jarvis F (2006) Mathematics of sudoku I. Math Spectr 39(1):15–22