1. Stallings, W.: Cryptography and Network Security. Prentice Hall, Englewood Cliffs (2003)
2. Menezes, A., Vanstone, S., Van Oorschot, P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
3. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)
4. Ratan, R., Veni Madhavan, C.E.: Steganography based information security. IETE Tech. Rev. 19, 213–19 (2002)
5. Stinson, D.R.: Decomposition constructions for secret sharing schemes. IEEE Trans. Inf. Theory 40, 118–25 (1994)