1. Popa, R. (1998). An analysis of steganographic techniques. The Politehnica University of Timisoara, Faculty of Automatics and Computers, Department of Computer Science and Software Engineering.
2. Kahn, D. (1996, May). The history of steganography. In International Workshop on Information Hiding (pp. 1–5). Berlin: Springer.
3. The Science of Secrecy, Steganography. Last visited May 6, 2009, from
http://www.arch.columbia.edu/DDL/cad/A4S13
4. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM Systems Journal, 35(3.4), 313–336.
5. Johnson, N. (2009). Steganography. George Meson University. Last visited May 4, 2009, from
http://patriot.net/~johnson/html/neil/stegdoc