1. Cachin C. An Information-Theoretic Model for Steganography.Proc of 2 nd International Workshop on Information Hiding, LNCS 1525. Heidelberg: Springer-Verlag, 1998. 306–318.
2. Zöllner J, Federrath H, Klimant H,et al. Modeling the Security of Steganographic Systems.Proc of 2 nd International Workshop on Information Hiding, LNCS 1525. Heidelberg: Springer-Verlag, 1998, 344–354.
3. Katzenbeisser S, Petitcolas F A. Defining Security in Steganographic Systems.http://citeseer.ist.psu.edu/katzen-beisser02defining.html. June 2004.
4. Hopper N J, Langford J, Van Ahn L. Provably Secure Steganography.Advances in Cryptology—CRYPTO 2002 (LNCS 2442). Heidelberg: Springer-Verlag, 2002. 77–92.
5. Ettinger J M. Steganalysis and Game Euilibria.Proc. of 2 nd International Workshop on Information Hiding, LNCS 1525. Heidelberg: Springer-Verlag, 1998. 319–328.