1. Adee S. Spy vs. spy. IEEE Spectrum. (Aug. 2008); http://spectrum.ieee.org/computing/-software/spy-vs-spy/1. Adee S. Spy vs. spy. IEEE Spectrum . (Aug. 2008); http://spectrum.ieee.org/computing/-software/spy-vs-spy/1.
2. Alperovitch D. Revealed: Operation Shady RAT. McAfee 2011; http://www.mcafee.com/-us/resources/white-papers/wp-operation-shady-rat.pdf. Alperovitch D. Revealed: Operation Shady RAT . McAfee 2011; http://www.mcafee.com/-us/resources/white-papers/wp-operation-shady-rat.pdf.
3. Alureon trojan uses steganography to receive commands. (Sept. 2011); http://-www.virusbtn.com/news/2011/09_26. Alureon trojan uses steganography to receive commands. (Sept. 2011); http://-www.virusbtn.com/news/2011/09_26.
4. Analysis S. and Center R. World's largest digital steganography database expands again. SARC Press Release (Feb. 2012); http://www.sarc-wv.com/news/press_releases/-2012/safdb_v312.aspx. Analysis S. and Center R. World's largest digital steganography database expands again. SARC Press Release (Feb. 2012); http://www.sarc-wv.com/news/press_releases/-2012/safdb_v312.aspx.
5. Stretching the limits of steganography;Anderson R;Information Hiding. Springer,1996