1. Doshi, Ronak, Jain, Pratik, Gupta, Lalit: Steganography and its applications in security. Int. J. Mod. Eng. Res. (IJMER) 2(6), 4634–4638 (2012)
2. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Trans. Comput. 2, 26–34 (1998) (IEEE)
3. Siper, A., Farley, R., Lombardo, C.: The rise of steganography. In: Proceedings of Student/Faculty Research Day, CSIS, Pace University (2005)
4. Yunus, Y.A., Ab Rahman, S., Ibrahim, J.: Steganography: a review of information security research and development in muslim world. Am. J. Eng. Res. (AJER), 2(11), 122–128 (2013)
5. Simmons, G.J., The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, Proceedings of CRYPTO ’83, in: Lecture Notes in Computer Science, Plenum, New York, pp. 51–67 (1983)