1. Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G.: Information hiding—a survey. In: Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, vol. 87, no. 5, pp. 1062–1078 (1999)
2. Paul, S.: Cryptology: A Mathematician’s Quest for Making and Breaking the Code. Katholieke Universiteit Leuven, Department of ESAT/COSIC, Kasteelpark Arenberg 10, B{3001, Leuven-Heverlee, Belgium
3. http://www.usatoday.com/tech/columnist/2001/12/19/maney.htm , 12/19/2001—updated 09:30 AM ET, last accessed April 1, 2011 at 1353 PM, PST
4. Ganeshkumar, V.; Koggalage, R.L.W.: A Language Independent Algorithm to Send Secret Messages using Steganography. In: International Conference on Advances in ICT for Emerging Regions (ICTer) 978-1-4244-9042-4/10/$26.00 ©2010 IEEE
5. http://edition.cnn.com/TECH/computing/9907/06/1963.idg/index.html , Available, last accessed Dec 21, 2010 at 1653 PM, PST