References
Anderson, R.J. & Petitcolas, F.A.P.(1998), "On the limits of Steganography". IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, 16(4), pp. 474-481.
Artz, D. (2001), "Digital Steganography: Hiding Data within Data". IEEE Internet Computing May-June 2001.
Bender,W. at al. (1996), "Techniques for data hiding". IBM Systems Journal, Vol 35, Nos 3&4.
Bender, W. at al. (2000), "Application for data hiding". IBM Systems Journal, Vol 39, Nos 3&4.
Chae, J.J. & Manjunath,B.S. (2002), "A Robust Embedded Data from Wavelet Coefficients". Department of Electrical and Computer Engineering, University of California, Santa Barbara.
Hwang, M. S., Chang, C. C., and Hwang, K. F. (2000), "Digital Watermarking of Images Using Neural Networks". Journal of Electronic Imaging, 9(4), 548- 555.
Morimoto, N. (1995), "Techniques for Data Hiding in Audio Files". Thesis in Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
Petitcolas, F.A.P, Anderson,R.J. & Kuhn, M.G. (1999), "Information hiding - A Survey". Proceedings of the IEEE: 1062-1078.
Pfitzmann, B. (1996), "Information hiding terminology". In Proceedings of the First International Workshop on Information Hiding, LNCS 1174, 347-349, Springer-Verlag, Berlin.
http://www.pb.tp.tudolft.pl/Courses/FIP/noframes/fip-Basic.html