1. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights
2. Techniques for data hiding
3. Constructive Role of SFC & RGB Fusion versus Destructive Intrusion
4. A Review of Methods and Approach for Secure Stegnography;Mahajan;International Journal of Advanced Research in Computer Science and Software Engineering,2012
5. Art of Hiding: An Introduction to Steganography;Rana;International Journal Of Engineering And Computer Science,2012