- Krenn, J. R. “Steganography and Steganalysis”; http://www.Krenn.nl/univ/cry/steg/article.pdf.##
- Xiang, L.; Wu, W.; Li, X.; Yang, C. “A Linguistic Steganography Based on Word Indexing Compression and Candidate Selection”; Multimed. Tools Appl. 2018, 77, 28969–28989.##
- Liu, T. Y.; Tsai, W. H. “A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique”; IEEE Trans. Inf. Foren. Sec. 2007, 2, 24–30.##
- Yang, W. C.; Chen, L. H. “A Steganographic Method via Various Animations in PowerPoint Files”; Multimed. Tools Appl. 2015, 74, 1003–1019.##
- Khairullah, M. “A Novel Text Steganography System Using Font Color of the Invisible Characters in Microsoft Word Documents”; Int. C. Comp. Elec. Eng. 2009, 482-484.##
- Bolshakov I. A. “A Method of Linguistic Steganography Based on Collocational-Verified Synonymy”; Fridrich J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg 2004##.
- Shahreza, M. H. S.; Shahreza, M. S. “A New Approach to Persian/Arabic Text Steganography”; Proc. 5th IEEE/ACIS Int. Conf. Comput. Inform. Sci. and 1st IEEE/ACIS Int. Workshop on Component-Based Software Engineering, Software Architecture and Reuse, 2006, 310-315.##
- Shahreza, M. H. S.; Shahreza, M. S. “A New Synonym Text Steganography”; Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, 2006, 1524-1526.##
- Lee, I. ; Tsai, W. H. “A New Approach to Covert Communication via PDF Files”; Signal Process 2010, 90, 557–565.##
- Khosravi, B.; Nazarkardeh, Kh. “A New Method for Pdf Steganography in Justified Texts”; J. Inf. Secur. Appl. 2019, 45, 2, 61-70.##
- Douglas, M.; Bailey, K.; Leeney, M.; Curran, K. “An Overview of Steganography Techniques Applied to the Protection of Biometric Data”; Multimed. Tools Appl. 2018, 77, 13, 17333-17373.##
- Maji, G.; Mandal, Sh. “A Forward email Based High Capacity Text Steganography Technique Using a Randomized and Indexed Word Dictionary”; Multimed. Tools Appl. 2020, 79, 26549–26569.##
- Brassil, J. T.; Low, S.; Maxemchuk, N. F.; O'Gorman, L., "Electronic Marking and Identification Techniques to Discourage Document Copying”; IEEE J. Selected Areas Commun. 1995, 13, 1495-1504.##
- Mahato, S.; Khan, D. A.; Yadav, D. K. “A Modified Approach to Data Hiding in Microsoft Word Documents by Change-Tracking Technique”; J. Comput. Inf. Sci. 2020, 32, 216-224.##
- Winstein, K. “Lexical Steganography Through Adaptive Modulation of the Word Choice Hash”; Secondary education at the Illinois Mathematics and Science Academy, 1999, http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 20 March 2017.##
- Kumar R.; Singh, H. “Recent Trends in Text Steganography with Experimental Study”; Gupta B., Perez G., Agrawal D., Gupta D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham, 2020.##
- Shamalizadeh Baei, M. A.; Norozi, Z.; Sabzinezhad, M.; Karami M. R. “Designing an Image Steganography Algorithm Based on Entropy and ELSB2”; Adv. Defence Sci. & Technol. 2018, 02, 39-50 (In Persian).##
|