1. G.J Simmons, Prisoner's Problem and the Subliminal Channel (The), CRYPTO83—Advances in Cryptology, Aug. 1984, pp. 51–67.
2. N.F Johnson and S. Katzenbeisser, “A Survey of Steganographic Techniques,” in Information Hiding S. Katzenbeisser and F. Petitcoals (Eds.), Artech House, Norwood, MA, 2000, pp. 43–78.
3. N.F. Johnson and S. Jajodia, “Steganalysis of Images Created Using Current Steganography Software,” in Information Hiding, David Aucsmith (Ed.), LNCS 1525, Springer-Verlag Berlin Heidelberg, 1998, pp. 32–47.
4. A. Westfield and A. Pfitzmann, “Attacks on Steganographic Systems,” in Information Hiding, LNCS 1768, Springer-Verlag Heidelberg, 1999, pp. 61–76.
5. J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images,” in Proc. of the ACM Workshop on Multimedia and Security, Ottawa, CA, Oct., 2001, pp. 27–30.