1. Konoplev, A.S. and Busygin, A.G., Steganographic methods of communications in distributed computing networks, ACM International Conference Proceeding Series, 2015. https://doi.org/10.1145/2799979.2800024
2. Fridrich, J., Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge: Cambridge Univ. Press, 2009.
3. Korzhik, V.I., et al., Tsifrovaya steganografiya i tsifrovye vodyanye znaki. Chast’ 1. Tsifrovaya steganografiya (Digital Steganography and Digital Watermarks. Part 1. Digital Steganography), St. Petersburg: SPbGUT, 2016.
4. Korzhik, V., Fedyanin, I., Godlewski, A., and Morales-Luna, G., Steganalysis based on statistical properties at the encrypted message, Lect. Notes Comput. Sci., 2017, vol. 10446, pp. 288–299.
5. Oswal, S., Singh, A., and Kumari, K., Deflate compression algorithm, Int. J. Eng. Res. Gen. Sci., 2016, vol. 4, no. 1, pp. 430–436.