1. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, IBM Systems Journal 35, 210–224 (2002).
2. A steganographic method for images by pixel-value differencing
3. K. Hempstalk, “Hiding behind corners: Using edges in images for better stegaography,” in Proceedings of the IEEE (2006).
4. K. M. Singh, L. S. Singh, A. B. Singh, and K. S. Devi, Proceedings of International Conference on Informa-tion and Communication Technology 238–241 (2007).
5. C.-H. T. Yang and C.-H. Hsu, IEEE Fifth International Conference on Information Assurance and Security 2, 603–606 (2009).