Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
11 SI
Page No.
9176 - 9181
References
Al-Shatanawi, O.M. and N.N. El-Emam, 2015. A new image steganography algorithm based on Mlsb method with random pixels selection. Intl. J. Network Secur. Appl., 7: 37-53.
Direct Link | El-Emam, N.N. and R.A.S. Al-Zubidy, 2013. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Software, 86: 1465-1481.
Direct Link | Jassim, F. and H. Qassim, 2012. Five modules method for image compression. Signal Image Process. Intl. J., 3: 19-28.
CrossRef | Direct Link | Kahate, A., 2008. Cryptography and Network Security. 2nd Edn., McGraw-Hill Education, New York, USA.,.
Pennebaker, W. and J. Mitchell, 1993. Still Image Compression Standard. Van Nostrand, New York, USA.,.
Petkovic, M. and W.P. Jonker, 2009. Special issue on secure data management. J. Comput. Secur., 17: 1-3.
Todd, R.R., 2005. Digital Image Sequence Processing, Compression and Analysis. Taylor & Francis, Milton Park, Didcot, UK., ISBN:9780849315268, Pages: 272.