참고문헌
- Hasso, Shahd. Hiding compressed texts in an audio file, Al-Rafidain Journal of Computer Science and Mathematics, Volume (10) Issue (1), (a special issue of the proceedings of the Fifth Scientific Conference in Information Technology). - 2013 .
- Kandilji, Amer Ibrahim et al. Information and Communication Networks, Amman: Dar Al Masirah, 2012 .
- Hussein, Abdul Amir Khalaf. Encryption Methods for Beginners, Amman: Dar Wael for Publishing and Distribution, 2010.
- Al-Hamami, Alaa Hussein and Al-Ani, Saad Abdel-Aziz. Information Security Technology and Protection Systems, Amman: Dar Wael for Publishing and Distribution, 2007.
- Abdullah Sadoon Hussein, Steganography Methods and some application (The hidden Secret data in Image) , Mosul : University of Mosul, 2009.
- Andrews Chinchu Elza and Joseph Iwin Thanakumar, An analysis of various stegnographic algoritms, International Journal of Advanced Research in Electronics and Communication Engineering (IJAREC) .Volume 2, Issue 2, February 2013.
- Felicisimo V. W., Bobby D. G. and Bartolome T. T. Modified AES Algorithm using Multiple S-Boxes". Proceedings of the Second International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA) , Manila, Philippine, 2015.
- Fouad Mohamed M, Enhancing the Imperceptibility of Image Steganography for Information, The Federated Conference on Computer Science and Information Systems, 2017. - pp. pp. 545-548.
- Jeffrey A Bloom, Digital watermarking and steganography, Morgan Kaufmann publications, 2008.
- Joye M., Cryptographic Hardware and Embedded Systems-CHES, New York, 2004.
- Kevin L., Advanced Encryption Standard (AES) Selection Process- How Rijndael Won, MIDN 1, 2015.
- Kobayashi L, Furuie S and Barreto P, Providing Integrity and Authenticity in DICOM Images: A novel Approach, IEEE Transactions on Information Technology in Biomedicine. - 2009. - pp. pp. 582-589.
- Koduri Nani, Information Security through Image Steganography Using Least Significant Bit Algorithm, London: University of East London, 2011.
- Stallings W., Cryptography and Network Security: Principles and Practice : Prentice Hall, 2013.
- Sumathy V. and Navaneethan C., Enhanced AES Algorithm for Strong Encryption, International Journal of Advances in Engineering& Technology (IJAET). - 2012.
- Whitman M E and Mattord H J, Principles of information security, Thomson, 2012.
- Zinaly Elham and Naghipour Avaz, Audio Steganography to Protect the Confidential Information: A Survey, International Journal of Computer Applications. - July 2017. - pp. 22-29.