1. Davern P, Scott M. “Steganography its history and its application to computer based data files,” Internal Report Working Paper: CA-0795, School of Computing, Dublin City University 1995. http://computing.dcu.ie/research/papers/1995/0795.pdf.
2. Graphstega: Graph Steganography Methodology;Desoky;Journal of Digital Forensic Practice,2008
3. Bennett K. “Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text,” CERIAS Tech Report 2004-13, Purdue University, 2004.