1. S. Alam, A. Jamil, A. Saldhi, M. Ahmad, Digital image authentication and encryption using digital signature, in International Conference on Advances in Computer Engineering and Applications (ICACEA), vol. 19–20 (March 2015), pp. 332–336. ISBN:978-1-4673-6911-4/15
2. Z. Li, X. Chen, X. Pan, X. Zeng, Lossless data hiding scheme based on adjacent pixel difference, in Proceedings of the International Conference on Computer Engineering and Technology, (2009), pp. 588–592
3. S. Islam, P. Gupta, Revisiting least two significant bits steganography, in Proceedings of the 8th International Conference on Intelligent Information Processing (ICIIP), Seoul, Republic of Korea, 1–3 April 2013, pp. 90–93
4. S. Alam, V. Kumar, W.A. Siddiqui, M. Ahmad, Key-dependent image steganography using edge detection, in International Conference on Advanced Computing & Communication Technologies, (2014), pp. 85–88
5. S. Alam, S.M. Zakariya, M.Q. Rafiq, Analysis of modified LSB approaches of hiding information in digital images, in International Conference on Computational Intelligence and Communication Systems, (IEEE, Hybrid Intelligent Systems, 2013), pp. 280–285. ISBN 978-1-4799-7633-1/14/2014