1. Currie, D.L. Surmounting the effects of lossy compression on Steganography / D.L. Currie,C.E. Irvine // 19th National Information Systems Security Conference. - Baltimore, 1996.
2. Ahsan, K. Practical Data hiding in TCP/IP / K. Ahsan, D. Kundur // Proceedings of the Workshop on Multimedia Security at ACM Multimedia. - Canada, 2002.
3. Johnson, N.F. Exploring Steganography: Seeing the Unseen / N.F. Johnson, S. Jajodia // Computer Journal. - 1998. - Vol. 31, № 2. - P. 26-34.
4. Katzenbeisser, S. Information Hiding Techniques for Steganography and Digital Watermarking / S. Katzenbeisser, F.A.P. Petitcolas. - Norwood, MA : Artech House, 2000.
5. Niimi, M. High Capacity and Secure Digital Steganography to Palette-Based Images / M. Niimi // IEEE International conference on image processing. - Japan, 2002. - Vol. 2. - P. 917-920.
6. Al-Sadoon, B. On the Development of Steganographic Tools / B. Al-Sadoon, H. Mathkour, Gh. Assassa // Proceedings of the 1st National Information Technology Symposium, NITS. - Riyadh, Saudi Arabia, 2006.
7. Morkel, T. An Overview of Image Steganography / T. Morkel, J.H.P. Eloff, M.S. Olivier. - South Africa : University of Pretoria, 2002.
8. Bender W. Techniques for data hiding / W. Bender, D.Gruhl // IBM Systems Journal. - 1996. - Vol. 35, № 3-4.
9. Krenn, R. Steganography and steganalysis, Internet Publication, March 2004 [Electronic resource] / R. Krenn. - Mode of access : http://www.krenn.nl/univ/cry/steg/article.pdf. - Date of access : 24.12.2012.
10. Steganography Software [Electronic resource]. - Mode of access : http://www.jjtc.com/Steganography/tools.html. - Date of access : 23.12.2012.
11. Brundick, F. Implementation of Spread Spectrum Image Steganography / F. Brundick, L. Marvel [Electronic resource]. - 2001. - Mode of access : http://permanent.access.gpo.gov/gpo2618/ARL-TR-2433.pdf. - Date of access : 24.12.2012.
12. Chang, C.C. Introduction to the Visual Cryptography / C.C. Chang, L.Z. Chuang // Communication of the Chinese Cryptology and Information Security Association (CCISA). - 2004. - Vol. 10, № 2. - P. 1-14.
13. Meenu Kumari, A. JPEG Compression Steganography & Crypography Using Image-Adaptation Technique / A. Meenu Kumari, P. Khare // Journal of Advances in Information Technology.- 2010. - Vol. 1, № 3.
14. Bushra Kassim Al-Abudi. Colour Image Data Compression Using Multilevel Block Trunsaction Coding Technique / Bushra Kassim Al-Abudi // Phd Thesis. - Baghdad : College of Science,2002.
15. Sua’d Kakil, A. Image in Image Hiding System using Iterated Function System (IFS) /A. Sua’d Kakil // Msc Thises. - Iraq : University of Sulaimani, 2009.
16. Khosravi, S. A new steganography method based HIOP (Higher Intensity Of Pixel) algorithm and Strassen's matrix multiplication / S. Khosravi, M.A. Dezfoli, M.H. Yektaie // Journal of Global Research in Computer Science. - 2011. - Vol. 2, № 1.
17. Mathkour, H. A New Image Steganography Technique / H. Mathkour, B. Al-Sadoon, A. Touir // Wireless Communications, Networking and Mobile Computing (WiCOM) : 4th International Conference on IEEE. - Dalian, China, 2008. - P. 1-4.
18. Babu, S. Authentication of Secret Information in Image Steganography / S. Babu, K.B. Raja // IEEE. - India : University of Heydarabad, 2008. - P. 1-6.