H. V. Desai, "Steganography, Cryptography, Watermarking: A Comparative Study," Journal of Global Research in Computer Science, vol. 3, no. 12, pp. 33-35, 2012.
 M. A. Al-Taee, N. H. Al-Hassani, B. S. Bamajbour and D. Al-Jumeily, "Biometric-Based Security System for Plaintext E-mail Messages," in: Proc. International Conference on Developments in eSystems Engineering, Abu Dhabi, UAE, , pp. 1-6, 14 – 16 December 2009.
 N. Qasrawi, M. A. Al-Taee, H. I’emair and R. Al-Asa’d, "Multilevel Encryption of Plaintext Messages Using a Smart Card Connected to PC Parallel Port," in: Proc. 3rd International Conference on Modelling, Simulation and Applied Optimization, Sharjah-UAE, , pp. 1-6, 20-22 January 2009.
 S. Katzenbeisser and F. A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Inc, 2000.
 H. A. Al-Korbi, A. Al-Ataby, M. A. Al-Taee and W. Al-Nuaimy, "High-Capacity Image Steganography Based on Haar DWT for Hiding Miscellaneous Data," in: Proc. IEEE/ AEECT'2015 Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, Jordan, pp. 1-6, 3-5 November 2015.
 S. Jayasudha, "Integer Wavelet Transform Based Steganography Method Using Opa Algorithm," International Journal of Engineering and Science, vol. 2, no. 4, pp. 31–35, 2013.
 A. Al-Ataby and F. M. Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform," International Arab Journal of Information Technology, vol. 7, no. 4, pp. 358–364, 2010.
 S. Banerjee, S. Chakraborty, N. Dey, A. K. Pal and R. Ray, "High Payload Watermarking Using Residue Number System," International Journal of Image, Graphics and Signal Processing, vol. 3, pp. 1-8, 2015.
 M. S. Al-Yaman, M. A. Al-Taee and H. Alshammas, "Audio-Watermarking Based Ownership Verification System Using Enhanced DWT-SVD Technique," in: Proc. IEEE/SSD2012 Multi-Conference on Systems, Signals and Devices, Chemnitz-Germany, pp. 1-5, 20-23 March 2012.
 M. S. Al-Yaman, M. A. Al-Taee, A. T. Shahrour and I. A. Al-Husseini, "Biometric Based Audio Ownership Verification Using Discrete Wavelet Transform and SVD Techniques," in: Proc. IEEE/SSD2011 Multi-Conference on Systems, Signals and Devices, Tunisia, pp. 1-5, 22-25 March 2011.
 N. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE Computer, vol. 31, pp. 26–34, 1998.
 D. Wu and W. Tsai, “A Steganography Method for Images by Pixel-value Differencing," Pattern Recognition Letters, vol. 24, pp. 1613–1626, 2002.
 A. Hashad, A. Madani and A. Wahdan, "A Robust Steganography Technique Using Discrete Cosine Transform Insertion," in: Proc. Int. Conf. on Information and Communications Technology, Cairo, Egypt, pp. 255–264, 5-6 December 2005.
 P. Chen and H. Lin, "A DWT Approach for Image Steganography," International Journal of Applied Science and Engineering, vol. 4, no. 3, pp. 275–290, 2006.
 H. S. Reddy and K. B. Raja, “High Capacity and Security Steganography Using Discrete Wavelet Transform,” International Journal of Computer Science and Security, vol. 3, no. 6, pp. 462-472, 2010.
 N. Dey, A. Roy and S. Dey, "A Novel Approach of Colour Image Hiding Using RGB Colour Planes and DWT," International Journal of Computer Applications, vol. 36, no. 5, pp. 19–24, 2011.
 T. Bhattacharya, N. Dey and S. Chaudhuri, "A Session Based Multiple Image Hiding Technique Using DWT and DCT," International Journal of Computer Applications, vol. 38, no.5, pp. 18–21, 2012.
 E. Ghasemi, J. Shanbehzadeh and N. Fassihi, "High Capacity Image Steganography Using Wavelet Transform and Genetic Algorithm," in: Proc. Int. Multi-Conference of Engineering and Computer Scientists (IMECS), vol. 1, Hong Kong, pp. 1–4, 16-18 March 2011.
 S. Laskar and K. Hemachandran, "High Capacity Data Hiding Using LSB Steganography and Encryption," International Journal of Database Management Systems, vol. 4, no. 6, pp. 57–68, 2012.
 P. Ganesan and P. Bhavani, "A High Secure and Robust Image Steganography Using Dual Wavelet and Blending Model," Journal of Computer Science, vol. 9, no. 3, pp. 277–284, 2013.
M. Parul and R. Harish, "Optimized Image Steganography Using Discrete Wavelet Transform (DWT)," International Journal of Recent Development in Engineering and Technology, vol. 2, no. 2, pp. 75–81, 2014.
 A. Nag, S. Biswas, D. Sarkar and P. Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding," International Journal of Computer Science and Security, vol. 4, no. 6, pp. 561–570, 2011.
 I. Badescu and C. Dumitrescu, "Steganography in Image Using Discrete Wavelet Transformation," in: Proc. WSEAS Conf. on Advances in Mathematical Models and Production Systems in Engineering, Brasov, Romania, pp. 69-72, 26-28 June 2014.
 M. Sifuzzaman, M. Islam and M. Z. Ali, "Application of Wavelet Transform and Its Advantages Compared to Fourier Transform," Journal of Physical Science, vol. 13, pp. 121–134, 2009.
 L. Jing, K. Zhi-wei and H. Yi-gang, "A Steganography Method Based on Wavelet Contrast and LSB," Chinese Journal of Electronics, vol. 35, pp. 1391–1393, 2007.
 W. Shakespeare, "The Tempest," Online: http://sparks. eserver. org/books/shakespeare-tempest. pdf, last accessed 15 January 2016.