1 |
Zinaly Elham and Naghipour Avaz, Audio Steganography to Protect the Confidential Information: A Survey, International Journal of Computer Applications. - July 2017. - pp. 22-29.
|
2 |
Hussein, Abdul Amir Khalaf. Encryption Methods for Beginners, Amman: Dar Wael for Publishing and Distribution, 2010.
|
3 |
Al-Hamami, Alaa Hussein and Al-Ani, Saad Abdel-Aziz. Information Security Technology and Protection Systems, Amman: Dar Wael for Publishing and Distribution, 2007.
|
4 |
Andrews Chinchu Elza and Joseph Iwin Thanakumar, An analysis of various stegnographic algoritms, International Journal of Advanced Research in Electronics and Communication Engineering (IJAREC) .Volume 2, Issue 2, February 2013.
|
5 |
Felicisimo V. W., Bobby D. G. and Bartolome T. T. Modified AES Algorithm using Multiple S-Boxes". Proceedings of the Second International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA) , Manila, Philippine, 2015.
|
6 |
Jeffrey A Bloom, Digital watermarking and steganography, Morgan Kaufmann publications, 2008.
|
7 |
Joye M., Cryptographic Hardware and Embedded Systems-CHES, New York, 2004.
|
8 |
Kobayashi L, Furuie S and Barreto P, Providing Integrity and Authenticity in DICOM Images: A novel Approach, IEEE Transactions on Information Technology in Biomedicine. - 2009. - pp. pp. 582-589.
|
9 |
Koduri Nani, Information Security through Image Steganography Using Least Significant Bit Algorithm, London: University of East London, 2011.
|
10 |
Sumathy V. and Navaneethan C., Enhanced AES Algorithm for Strong Encryption, International Journal of Advances in Engineering& Technology (IJAET). - 2012.
|
11 |
Whitman M E and Mattord H J, Principles of information security, Thomson, 2012.
|
12 |
Fouad Mohamed M, Enhancing the Imperceptibility of Image Steganography for Information, The Federated Conference on Computer Science and Information Systems, 2017. - pp. pp. 545-548.
|
13 |
Hasso, Shahd. Hiding compressed texts in an audio file, Al-Rafidain Journal of Computer Science and Mathematics, Volume (10) Issue (1), (a special issue of the proceedings of the Fifth Scientific Conference in Information Technology). - 2013 .
|
14 |
Kandilji, Amer Ibrahim et al. Information and Communication Networks, Amman: Dar Al Masirah, 2012 .
|
15 |
Abdullah Sadoon Hussein, Steganography Methods and some application (The hidden Secret data in Image) , Mosul : University of Mosul, 2009.
|
16 |
Stallings W., Cryptography and Network Security: Principles and Practice : Prentice Hall, 2013.
|
17 |
Kevin L., Advanced Encryption Standard (AES) Selection Process- How Rijndael Won, MIDN 1, 2015.
|