1. Bailey K, Curran K (2006) An evaluation of image-based steganography methods. Multimedia Tools Appl 30(1):55–88. https://doi.org/10.1007/s11042-006-0008-4
2. “Anderson RJ (1996) Stretching the limits of steganography. In: 1st information hiding workshop, Springer Lecture notes in computer science, vol 1174, pp 39–48
3. Gutub A, Ghouti L, Amin A, Alkharobi T, Ibrahim MK (2007) Utilizing extension character ‘Kashida’ with pointed letters for arabic text digital watermarking. In: International conference on security and cryptography—SECRYPT, Barcelona, Spain, 28–31 July 2007
4. Neeta D, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. In: 1st international conference on digital information management, pp 173–178
5. Halim SA, Sani MFA (2010) Embedding using spread spectrum image steganography with GF (2m). In: Proceedings of IMT-GT-ICMSA, pp 659–666