[[1] JÓKAY, M.- MORAVČÍK, T,: Image-based JPEG steganography, Tatra Mt. Math. Publ. 45 (2010), 65-74.]Search in Google Scholar
[[2] ANDERSON, R.-NEEDHAM, R.-SHAMIR, A.: The steganographic file system, in: Information Hiding, Second InternationalWorkshop, IH’ 98, Portland, Oregon, USA, April 15-17 (Aucsmith, D. ed.), LNCS Vol. 1525, Springer-Verlag, 1998, pp. 73-82.]Search in Google Scholar
[[3] MCDONALD, A. D.-KUHN, M. G.: StegFs: A steganographic file system for Linux, (A. Pfitzmann ed.), in: LNCS Vol. 1768, Springer-Verlag Berlin, 2000, pp. 463-477.]Search in Google Scholar
[[4] BERTONI, G.-DAEMEN, J.-PEETERS, M.-VAN ASSCHE, G.: The Keccak reference, NIST SHA-3, 2011 (submission).]Search in Google Scholar
[[5] TUNG HOANG, V.-ROGAWAY, P.: On generalized Feistel networks, in: Proceedings of the 30-th annual conference on Advances in cryptology (CRYPTO’10), (Tal Rabin, ed.) Springer-Verlag, Berlin, Heidelberg, 2010, pp. 613-630.10.1007/978-3-642-14623-7_33]Search in Google Scholar
[[6] BATEMAN, P.: Image Steganography and Steganalysis, Diploma thesis, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, 2008.]Search in Google Scholar
[[7] WESTFELD, A.: F5-a Steganographic Algorithm: High Capacity Despite Better Steganalysis, in: 4-th International Workshop on Information Hiding, 2001.10.1007/3-540-45496-9_21]Search in Google Scholar
[[8] NAG, A.-SINGH, J. P.-KHAN, S.-GHOSH, S.-BISWAS, S.-SARKAR, D.- SARKAR, P. P: A Weighted Location Based LSB Image Steganography Technique, in: Advances in Computing and Communications, ACC 2011 Conference Communications in Computer and Information Science, Vol. 191, Springer-Verlag, Berlin, 2011, pp. 620-627.10.1007/978-3-642-22714-1_64]Search in Google Scholar
[[9] GROˇ SEK, O.-VOJVODA, M.-ZAJAC, P.: Classical Ciphers, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, 2007.]Search in Google Scholar
[[10] CHANG, K.: Knowledge file system in: A Principled Approach to Personal Information Management, 2010, IEEE International Conference on Data Mining Workshops, 2010.10.1109/ICDMW.2010.119]Search in Google Scholar
[[11] KATZENBEISSER, S.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, London, 1999.]Search in Google Scholar
[[12] FREE SOFTWARE FOUNDATION, INC.: The GNU C Library Manual: File Times, 2013, http://www.gnu.org/software/libc/manual/html_node/File-Times.html.]Search in Google Scholar
[[13] OLIBONI, C.: OpenPuff, http://embeddedsw.net/OpenPuff_Steganography_Home.html.]Search in Google Scholar
[[14] PAUL, H.-UPHAM, D.: JSteg, http://zooid.org/~paul/crypto/jsteg.]Search in Google Scholar
[[15] HETZL, S.: StegHide, http://steghide.sourceforge.net.]Search in Google Scholar
[[16] LATHAM, A.: JP Hide & JP Seek, http://linux01.gwdg.de/~alatham/stego.html.]Search in Google Scholar
[[17] PROVOS, N.: OutGuess, http://www.outguess.org.]Search in Google Scholar
[[18] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiency by combining Hamming Codes and Wet Paper Codes, in: Information Hiding, 10th International Workshop, 2008, pp. 60-71.10.1007/978-3-540-88961-8_5]Search in Google Scholar
[[19] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis: Concepts and practice, in: International Workshop on Digital Watermarking, 2003, (T. Kalker et al. eds.) LNCS Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.]Search in Google Scholar
[[20] ZAJAC, P.: Remarks on the NFS complexity, Tatra Mt. Math. Publ. 41 (2008), 79-91. ]Search in Google Scholar