1. Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw Hil , 2007.
2. Herbert Schidlt, “Java the Complete Reference”, 8th Edition, McGraw Hill, 2011.
3. N.F. Johnson and S. Jajodia, “Explor ing Steganography: Seeing the Unseen”, Computer, Vol. 31, No. 2, pp.26-34, 1998.
4. S. Song, J. Zhang, X. Liao, J. Du and Q.Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Procedia Engineering, Vol. 15, pp. 2767-2772, 2011.
5. A.J. Raphael and V. Sundaram, “Cryptography and Steganography-A Survey”, Internatio nal Journal of Computer Technology and Applicatio ns, Vol. 2, No. 3, pp. 626-630, 2016.