1. European Commission report on the application of the IPR Enforcement Directive (2004/48/ec)
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0779:FIN:EN:PDF
(last visited 4 March 2015).
2. Muni Sekhar V, K. Venu gopal Rao and N. Sambasiva Rao (2011) Convention Cloud application development: SOA. In: International Journal of Advanced Computing Vol. 3(3) pp 108–112.
3. Muni Sekhar V, K. Venu gopal Ra, N. Sambasiva Rao and M. Ravi Kumar (2013) Guaranteed Quality of Service in cloud ready application. In: IEEE conference of International Symposium on Computational and Business Intelligence 2013, New Delhi, India pp 24–28.
4. Ingemar J. Cox, Mathew L. Miller, Jeffrey A. Bloom, Jessica Fridrich and Ton Kalker (2008) Digital Watermarking and Steganography. As a text book: 2nd Edition MK publication, 2008.
5. Po-Yuch Chen and Hung-Ju Lin (2006) A DWT Based Approach for image steganography.In: International Journal of Applied Science and Engineering 2006, Vol. 4(3) pp 275–290.