1. Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.
2. Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.
3. Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis,49(4), 584–588.
4. Szczypiorski, K. (2003). Steganography in TCP/IP networks, state of the art and proposal of a new system-HICCUPS. Retrieved from January 2018
http://krzysiek.tele.pw.edu.pl/pdf/steg-seminar-2003.pdf
.
5. Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31–40).