References
[1] Neil.F.Johnson and sushil jajodia, - steganography:
seeing the unseen, IEEE computer, February 1998.
[2] Johnson, N.F., Duric, Z and Jajodia S. - 2001
Information Hiding: Steganography and Watermarking
Attacks and Countermeasures, Kluwer Academic,
Dordrecht, The Netherlands.
[3] Johnson, N.F. and Jajodia S. - 1998, Steganalysis: The
Investigation of Hidden Information. In IEEE Conference
on Information technology. Kearns, M.J. and Vazirani, U.v.1994
[4] Cole E - Hiding in Plain Sight: Steganography and the
Art of Covert Communication, Wiley Publishing, Inc.,
2003.
[5] Westfeld, A. - 1999. F5 A Steganographic Algorithm. In
Third International Workshop on Information Hiding.
(Dresden, Germany), Springer Verilag.
[6] Myke Predky - customizing PIC microcontroller.
[7] Steganography Mailing List - Markus Kuhn--1995-07-03
URL:http://www.thur.de/ulf/stegano/
[ 8 ] Windows BMPB itmap File Format
URL:http://web.uccs.edu/wbahn/ECE1021/index.html.
[ 9 ] Microcontroller references URL:
http://www.microchip.com.