1. [1] A.S. Incorporated, “Document management — portable document format — part 1: PDF 1.7.” ISO 32000-1:2008, July 2008.
2. [2] S. Zhong, X. Cheng, and T. Chen, “Data hiding in a kind of PDF texts for secret communication,” Int. J. Network Security, vol.4, pp.17-26, 2007.
3. [3] L.Y. Por and B. Delina, “Information hiding: a new approach in text steganography,” Proc. ACACOS'08, pp.689-695, 2008.
4. [4] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol.35, no.3-4, pp.313-336, 1996. 10.1147/sj.353.0313
5. [5] I.-S. Lee and W.-H. Tsai, “A new approach to covert communication via PDF files,” Signal Processing, vol.90, no.2, pp.557-565, 2010. 10.1016/j.sigpro.2009.07.022