1. Jessica Fridrich. 2010. Steganography in digital media: principles algorithms and applications. Cambridge UK: Cambridge University Press. Jessica Fridrich. 2010. Steganography in digital media: principles algorithms and applications. Cambridge UK: Cambridge University Press.
2. John Wilkins. 1694. Mercury: Or the secret and swift Messenger. London 2nd Edition. John Wilkins. 1694. Mercury: Or the secret and swift Messenger. London 2nd Edition.
3. La cryptographie militaire;Kerckhoffs Auguste;Journal des sciences militaires,1883
4. Elad Erez Luda Lazar. 2018. Insider Threats - A Deep Dive into Database Attacks {Part III}: Why Scarlett Johansson's Picture Got My Postgre Database to Start Mining Monero (March 13th 2018). Available: https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-jolianssons-picture-used-for-crypto-mining-on-postgre-database/ - last access: 30.04.2018. Elad Erez Luda Lazar. 2018. Insider Threats - A Deep Dive into Database Attacks {Part III}: Why Scarlett Johansson's Picture Got My Postgre Database to Start Mining Monero (March 13th 2018). Available: https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-jolianssons-picture-used-for-crypto-mining-on-postgre-database/ - last access: 30.04.2018.