This work is licensed under a
Creative Commons Attribution 4.0 International License
 Biometric Steganographic Technique Using DWT and Encryption, Amritha.G. Meethu Varkey International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 3, March 2013 ISSN: 2277 128X.
 A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, ―Biometric inspired digital image Steganography‖, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engg. of Computer-Based Systems (ECBS"08), Belfast, 2008, pp.159-168.DOI: https://doi.org/10.1109/ecbs.2008.11
 ANALYSING SECURE IMAGE SECRET SHARING SCHEMES BASED ON STEGANOGRAPHY Sonali Patil, Kapil Tajane, Janhavi Sirdeshpande, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Volume 4, Issue 2, March – April (2013), pp.172-178.DOI: https://doi.org/10.1109/iccubea.2015.42
 A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, Biometric inspired digital image Steganography", in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS, 08), Belfast, (2008).DOI: https://doi.org/10.1109/ecbs.2008.11
 Chang, C. C., Chen, T. S and Chung, L. Z., A steganographic method based upon JPEG and quantization table modification, Information Sciences, vol.
 The Slantlet Transform Ivan W. Selesnick, Member, , IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 47, NO. 5, MAY (1999).