1. Adee Sally. Spy vs. Spy. IEEE Spectrum Online, August 2008, Retrieved 25 August 2008 from http://www.spectrum.ieee.org/aug08/6593.
2. Steganography: hidden images, a new challenge in the fight against child porn;Astrowsky,2005
3. Hiding in plain sight: steganography and the art of covert communication;Cole,2003
4. Czeskis Alexei, St. Hilaire David J, Koscher Karl, Gribble Steven D, Kohno Tadayoshi, Schneier Bruce. Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications. 3rd USENIX workshop on hot topics in security (HOTSEC'08), San Jose, CA; July 29, 2008. Available at: http://www.usenix.org/event/hotsec08/tech/full_papers/czeskis/czeskis.pdf.
5. Dolan-Gavitt Brendan. Forensic analysis of the windows registry in memory. In: Proceedings of the 8th annual DFRWS conference. Baltimore, MD; August 2008. p. S26–32.