1. Cox IJ, Kilian J, Leighton T, Shamoon T (1996) International workshop on information hiding. Springer, pp 185–206
2. Provos N, Honeyman P (2003) IEEE Secur Priv 99(3):32
3. Hariri M, Karimi R, Nosrati M (2011) World Appl Progr 1(3):191
4. Morkel T, Eloff JH, Olivier MS (2005) ISSA, pp 1–11
5. Jain YK, Ahirwal R (2010) Int J Comput Sci Secur 4(1):40