1. An overview of steganography;Kessler;Advan Comp,2011
2. A new algorithm for data hiding in images using contourlet transform;Mohan;Rec Advan Intell Comput Syst (RAICS) IEEE,2011
3. Gopalan K. Audio steganography using bit modification. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, (ICASSP ‘03), vol. 2; 2003. p. 421–4.
4. Security pitfalls of frame by-frame approaches to video watermarking;Doërr;IEEE Trans Signal Process, Suppl Secure Media,2004
5. Shahreza MS, Shahreza MH. An improved version of Persian/Arabic text steganography using “La” word. In: Proceedings of IEEE 6th national conference on telecommunication technologies; 2008. p. 372–6.