1. Exploring steganography: Seeing the unseen;Johnson;Computer,1998
2. Defining security in steganographic systems;Katzenbeisser,2002
3. On the limits of steganography;Anderson;IEEE J. Sel. Areas Commun.,1998
4. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, Vol. 1;Johnson,2001
5. Hiding data in images by simple LSB substitution;Chan;Pattern Recognit.,2004