1. Hybrid Information Security Models: Crypto-Steg And Steg-Crypto Systems;Adale,2011
2. A comparative study of the performance and security issues of AES and RSA cryptography;Al Hasib;Convergence and Hybrid Information Technology, 2008. ICCIT‘08. Third International Conference on,2008
3. Information hiding using steganography. Telecommunication Technology, 2003;Amin,2003
4. A Smart Card-based Authentication Scheme Using User Identify Cryptography;Chang;IJ Network Security,2013
5. A New approach to hindi text steganography by shifting matra;Changder,2009