1. Adams, C., & Lloyd, S. (1999). Understanding public-key infrastructure: concepts, standards, and deployment considerations. Macmillan Technical Publishing.
2. Location-driven watermark extraction using supervised learning on frequency domain.;R.Ando;WSEAS Transactions On Computers,2003
3. Digital steganography: hiding data within data
4. Bayesian theory.;J.Bernardo;Measurement Science & Technology,2001
5. Bishop, C. M. (1995). Neural networks for pattern recognition. Oxford University Press, USA.