1. On the limits of steganography;Anderson;IEEE J. Select. Areas Commun.,1998
2. Bishop, M., Bhumiratana, B., Crawford, R., Levitt, K., June 2004. How to sanitize data. In: Proceedings of 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’04). pp. 217–222.
3. Bourne, V., January 2005. The risk of sharing. Available from: .
4. On the role of file system metadata in digital forensics;Buchholz;J. Digital Invest.,2004
5. Information leakage caused by hidden data in published documents;Byers;IEEE Security Privacy,2004