1. Ahmad, S. 1988. A Study of Scaling and Generalization in Neural Networks, Tech. Rep. CCSR-88-13, University of Illinois, Centerfor Complex Systems Research, Urbana.
2. Aura, T., 1995. Invisible Communication. In Proc. of EET 1995, Tech. Rep., Helsinki University of Technology, Helsinki, Finland. (http://deadlock.hut.fi/ste/ste_html.html).
3. Berg, G., Davidson, I., Duan, M., and Paul. G. 2003. Searching for hidden messages: automatic detection of steganography. InProc. of the 15th AAAI Innovative Applications of Artificial Intelligence Conference, Acapulco, Mexico, August. 12-14,2003.
4. Cox, I. et al. 1996. A secure, robust watermark for multimedia. InProc. of the First International Workshop on Information Hiding, Lecture Notes in Computer Science No. 1, pp.185-206. Springer-Verlag, Berlin.