1. Morkel, T., Eloff, J.H., and Olivier, M.S. (July, January 29). An overview of image steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa.
2. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research;Kadhim;Neurocomputing,2019
3. A survey on image steganography and steganalysis;Li;J. Inf. Hiding Multim. Signal Process.,2011
4. Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker, T. (2007). Digital Watermarking and Steganography, Morgan Kaufmann.
5. Abraham, A., and Paprzycki, M. (2004, January 5–7). Significance of steganography on data security. Proceedings of the International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA.