1. Nosrati M Debray . Karimi R and Hariri M. 2011. An Introduction to steganography methodsWorld Applied Programming Vol (1) No (3) August 2011. 191--195 ISSN: 2222-2510 ©2011 WAP journal. www.waprogramming.com https://pdfs.semanticscholar.org/2331/1184a7b078945f519e8bf89c719fed7b1f81.pdf Nosrati M Debray . Karimi R and Hariri M. 2011. An Introduction to steganography methodsWorld Applied Programming Vol (1) No (3) August 2011. 191--195 ISSN: 2222-2510 ©2011 WAP journal. www.waprogramming.com https://pdfs.semanticscholar.org/2331/1184a7b078945f519e8bf89c719fed7b1f81.pdf
2. Sinha S. & Gupta P. 2016. Image Steganography using desynchronization. International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology 2320--088X IJCSMC pg.55--61 https://ijcsmc.com/docs/papers/February2016/V5I2201614.pdf Sinha S. & Gupta P. 2016. Image Steganography using desynchronization. International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology 2320--088X IJCSMC pg.55--61 https://ijcsmc.com/docs/papers/February2016/V5I2201614.pdf
3. Singh N. Bhati B.S. Raw R.S.(2012). Digital images steganalysis for computer forensic investigation India. Singh N. Bhati B.S. Raw R.S.(2012). Digital images steganalysis for computer forensic investigation India.
4. Alrefai S.A. 2019. Secure Data Hiding Technique Using Batch Video Steganography. Master's Thesis Middle East University. Alrefai S.A. 2019. Secure Data Hiding Technique Using Batch Video Steganography. Master's Thesis Middle East University.
5. M, and Nichal, N, 2016. A Review Paper on Video Steganography. In Distributed Systems, S. Mullender International Advanced Research Journal in Science;Sapate P;Engineering and Technology ISO,2007