1. J. Reeds, Cryptologia 22(4), pp. 191–317 (1998).
2. Information hiding-a survey
3. Petitcolas and A. P. Fabien, Techniques for Steganography and Digital Watermarking (Artech House, Boston, 2000), pp. 1–14.
4. J. Kelley, Terrorist instructions hidden online (2001).
5. WbStego4open, http://www.wbstego.wbailer.com/.