1. Laudon, K. C.; Laudon J.P.: Ethical and social issues in information systems. In: Management Information Systems: Managing the Digital Firm 7th edn. p. 169 (2002)
2. Yang, W.-C.; Chen, L.-H.; Lee, C.-H.: A difference expansion based reversible data hiding algorithm using edge-oriented prediction. Int. J. Secur. Appl. 8(6), 73–184 (2014)
3. Govind, P.V.S.; Wilscy, M.: A new reversible data hiding scheme with improved capacity based on directional interpolation and difference expansion. Proc. Comput. Sci. 46, 491–498 (2015)
4. Encarnacion, C.: Automated signature insertion in combinational logic patterns for HDL IP core protection. In: IEEE 4th Southern Conference on Programmable Logic (2008)
5. Poljicak, A.; Botella, G.; Garcia, C.; et al.: Portable real-time DCT-based steganography using OpenCL. J. Real-Time Image Process. 1–13 (2016). doi: 10.1007/s11554-016-0616-9