1. M. K. Sharma, and P. C. Gupta, '' A Comparative Study of Steganography and Watermarking'', International Journal of Research in IT & Management (IJRIM), Volume 2, Issue 2, pp. 2231-4334, February, 2012.
2. S. Voloshynovskiy et-al, ''StegoWall: Blind Statistical Detection of Hidden Data'', Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, 57 (April 29, 2002.
3. F. Al-Naima, S. Y. Ameen, and A. F. Al-Saad, ''Destroying Steganography Content in Image Files'', The 5th International Symposium on Communication Systems, Networks and DSP (CSNDSP’06), Greece, 2006..
4. I. S. Moskowitz, P. A. Lafferty, and F. Ahmed, ''Stego Scrubbing A New Direction for Image Steganography'', IEEE SMC Information Assurance and Security Workshop, IAW '07, 2007.
5. W. Jamieson, ''Destruction of Steganography: Targeting the Least Significant Bit in 24 bit Images'', http://www.emich.edu/ia/pdf/research/pdf