- H. Sajedi and Sh. R. Yaghoubi, “Review on Steganographic Methods in Texts,” 2018. (In Persian)##
- A. Stančić, I. Grgurevic, and V. Vyroubal, “Usage of the Steganography within Highway Information and Communication Network,” 4th International Virtual Research Conference In Technical Disciplines (RCITD 2016), Slovakia, 2016.##
- J. Zhai, M. Wang, G. Liu, and Y. Dai, “SkyLen: a Skype-Based Length Covert Channel,” Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 3, May 2015.##
- B. G. Banik and S. K. Bandyopadhyay, “Review on Steganography in Digital Media,” International Journal of Science and Research (IJSR), vol. 4, pp. 1-10, 2015.##
- M. M. Pontón Loaiza, “Steganography using RTP Packets,” University of Abertay Dundee, Dundee, September 2014.##
- A. P. Dhamade and K. J. Panchal, “Packet Data Based Network Steganography,” International Journal of Advance Engineering and Research Development, vol. 2, no. 5, pp. 1520-1526, May 2015.##
- A. NoorAzar, Z. Norouzi, and M. Mir, “Representing an Enhanced Method based on Image Steganography based on Linear Codes Features,” Journal of Electronic and Cyber Defence, vol. 5, no. 4, pp. 43-53, 2018. (In Persian)##
8. V. Sabeti, Sh, Samavi, and M. R. Ahmadzadeh, “Steganalysis of the Steganographic Method based on Pixels Value Differencing in Random Intervals using Neural Networks,” 14th National Conference of Computer Society of Iran, March 2009. (In Persian)##
- W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, and K. Szczypiorski, “Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures,” IEEE Press Series on Information & Communication Networks Security, 2016.##
- S. Wendzel, S. Zander, B. Fechner, and C. Herdin, “Pattern-Based Survey and Categorization of Network Covert Channel Techniques,” ACM Computing Surveys (CSUR), vol. 47, no. 3, pp. 50-77, 2015.##
- J. P. Black, “Techniques of Network Steganography and Covert Channels”, Sciences, 2013.##
- J. Lubacz, W. Mazurczyk, and K. Szczypiorski, “Principles and Overview of Network Steganography,” IEEE Communications Magazine, vol. 52, no. 5, pp. 225-229, 2014.##
- M. Van Horenbeeck, “Deception on the Network: Thinking Differently About Covert Channels,” Proc. 7th Australian Info, Warfare and Security Conf., 2006.##
- W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM. System Journal, vol. 35, no. 3, pp. 313–336, 1996.##
- W. Mazurczyk and K. Szczypiorski, “Covert Channels in SIP for VoIP signaling,” Proc. of 4th International Conference on Global E-security, United Kingdom, pp. 65-72, June 2008.##
- W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “Retransmission steganography and its detection,” Soft Computing, vol. 15, no. 3, pp. 505-515, 2011.##
- D. Kundur and K. Ahsan, “Practical Internet Steganography: Data Hiding in IP,” Proc. Texas Wksp. Security of Information Systems, 2003.##
- B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “PadSteg: Introducing Inter-Protocol Steganography,” Telecommunication Systems, vol. 52, no. 2, pp. 1101-1111, 2013.##
- K. Szczypiorski, “Steganography in TCP/IP Networks,” State of the Art and a Proposal of a New System – HICCUPS, Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, November 2003.##
- K. Szczypiorski and W. Mazurczyk, “Steganography in IEEE 802.11 OFDM Symbols,” International Journal of Security and Communication Networks, vol. 3, no. 2, pp. 118-129, 2011.##
- P. Bialczak, W. Mazurczyk, and K. Szczypiorski, “Sending Hidden Data via Google Suggest,” 2011.##
- W. Mazurczyk and K. Szczypiorski, “Steganography of VoIP streams”, OTM Confederated International Conferences, On the Move to Meaningful Internet Systems, pp. 1001-1018. Springer, Berlin, 2008.##
- W. Mazurczyk and J. Lubacz, “LACK: a VoIP steganographic method,” Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 45, no. 2, pp. 153-163, 2010.##
- W. Mazurczyk, J. Lubacz, and K. Szczypiorski. “On steganography in lost audio packets,” International Journal of Security and Communication Networks, vol. 7, no. 12, pp. 2602-2615, 2014.##
- W. Mazurczyk, “Lost audio packets steganography: a first practical evaluation,” International Journal of Security and Communication Networks, vol. 5, no. 12, pp. 1394-1403, 2012.##
- W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “On information hiding in retransmissions,” Telecommunication Systems, vol. 52, no. 2, pp. 1113-1121, 2013.##
27. W. Mazurczyk, P. Szaga, and K. Szczypiorski, “Using Transcoding for Hidden Communication in IP Telephony,” Multimedia Tools and Applications, vol. 70, no. 3, pp. 2139-2165, 2014.##
- W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Stream Control Transmission Steganography,” arXiv preprint arXiv: 1006.0247, 2010.##
- B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “Information Hiding Using Improper Frame Padding,” Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2010 14th International. IEEE, 2010.##
- W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Multi-Level Steganography: Improving Hidden Communication in Networks,” Journal of Universal Computer Science (J. UCS), Journal of Universal Computer Science (J. UCS), vol. 18, no. 14, pp. 1967-1986, 2012.##
- S. Ghanbari, N. Ghanbari, M. Keshtgari, and H. N. Karizi, “Steganalyisis in Images using Co-occurrence Matrix and Neural Networks,” Iranian Journal of Electrical and Computer Engineering, vol. 9, no. 3, 2012. (In Persian)##