1. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods.” Signal Processing, 2010, vol. 90, no. 3, pp. 727–752, March 2010
2. C. Hosmer and C. Hyde. Discovering covert digital evidence. Digital Forensic Research Workshop (DFRWS) 2003, August 2003 [Online]. (January 4, 2004). Available: http://www.dfrws.org/dfrws2003/presentations/Paper-Hosmer-digitalevidence.pdf
3. Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger. Steganography Analysis: Efficacy and Response-Time of Current Steganalysis Software. http://www.marshall.edu/forensics/files/GreenJordan_Research-Paper_08_07_20141.pdf
4. A. Whitehead, “Towards Eliminating Steganographic Communication”, Proc. International Conference on Privacy, Security and Trust (PST), October 12-14, 2005, New Brunswick, Canada
5. A. K. Shukla, “Data Hiding in Digital Images”, A Review[C] STEG’04: Pacific Rim Workshop on Digital Steganography, 2004