1. Simmons G J 1984 The prisoners’ problem and the subliminal channel. In: Chaum D (Ed.) Advances in Cryptology, Proceedings of CRYPTO ‘83. New York: Plenum Press, pp. 51–67
2. Johnson N F and Jajodia S 1998 Steganography: seeing the unseen. IEEE Computer 16: 26–34
3. Bhattacharyya S and Sanyal G 2008 Study of secure steganography model. In: Proceedings of the International Conference on Advanced Computing and Communication Technologies, Panipat, India
4. Bhattacharyya S and Gautam Sanyal G 2009 An image based steganography model for promoting global cyber security. In: Proceedings of the International Conference on Systemics, Cybernetics and Informatics, Hyderabad, India
5. Bhattacharyya S and Sanyal G 2009 Implementation and design of an image based steganographic model. In: Proceedings of the IEEE International Advanced Computing Conference, Patiala, India