1. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. Sel. Areas Commun. 16(4), 474–481 (1998)
2. Kim, C., Yang, C.-N.: Watermark with DSA signature using predictive coding. Multimed. Tools Appl. 1–15 (2013). doi: 10.1007/s11042-013-1667-6
3. Machado, R.: EzStego. http://www.stego.com
4. Fridrich, J.: A new steganographic method for palette-based images. In: Proceedings of the Conference on Image Processing. Image Quality and Image Capture Systems (PICS-99), Savannah, Georgia, USA, 25–28 April 1999, 285–289
5. Westfield, A., Pfitzmann, A.: Attacks on steganographic systems breaking the steganography utilities EzStego, Jsteg, Steganos and S-Tools and some lessons learned. Third International Workshop, IH’99 Dresden Germany, Computer. Science. 1768, 61–76 (1999)