1. Cuneyt MT, Umut T, Mercan T, Edward JD. Attacks on lexical natural language steganography systems. In: Proc. SPIE, San Jose, CA, USA; February 2006. p. 97–105.
2. Steganalysis on synonym substitution steganography;Gang;J Comp Res Dev,2008
3. Zhenshan Y, Liusheng H, Zhili C, Lingjun L, Xinxin Z. Detection of synonym-substitution modified articles using context information. In: Proc. 2nd Int. Conf. Future Generation Communication and Networking, Sanya, Hainan Island, China; December 2008, p. 134–9.
4. Keith W. Lexical steganography through adaptive modulation of the word choice hash. Available from: http://alumni.imsa.edu/~keithw/tlex/lsteg.ps (accessed April 2010).
5. Atallah MJ, McDonough CJ, Raskin V, Nirenburg S. Natural language processing for information assurance and security: an overview and implementations. In: Proc. 9th ACM/SIGSAC New Security Paradigms Workshop, New York, USA; September 2000. p. 51–65.