1. Ahsan K, Kundur D. Practical data hiding in TCP/IP. In: Proceedings of the workshop on multimedia security at ACM multimedia. vol. 6; 2002, 〈http://ee.tamu.edu/∼deepa/pdf/acm02.pdf〉 [Accessed on April 2011].
2. A method for automatic identification of signatures of steganography software;Bell;IEEE Transactions on Information Forensics and Security,2010
3. Techniques for data hiding;Bender;IBM Systems Journal,1996
4. Chipping away at censorship firewalls with user-generated content;Burnett,2010
5. Steganographic communication in ordered channels;Chakinala,2007