1. M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, S. A. Nur, M. M. Shakir, and Deris, IJACSA) Interna-tional Journal of Advanced Computer Science and Applications 8 (2017).
2. T. Nie and T. Zhang, TENCON 2009 IEEE Region 10 Conference (2009).
3. A Survey on Cryptography and Steganography Methods for Information Security
4. I. Landge, B. Contractor, A. Patel, and R. Choudhary, Proceedings of "National Conference on Emerging Trends in Information Technology (NCETIT-2012) 2012, 2231–2587.
5. P. Singh and K. Singh, International Journal of Scientific & Engineering Research 4 (2013150).