Document Type : Original Article

1.      Gotfried C. Prasetyadi ; Achmad Benny Mutiara ; Rina Refianti (2018) ,File encryption and hiding application based on advanced encryption standard (AES) and append insertion ,steganography method . 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, Indonesia.
1.     Sevierda Raniprima ; Bambang Hidayat ; Nur Andini (2017).Digital image steganography with encryption based on rubik's cube principle. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). Bandung, Indonesia.
 
2.       Praneeta D., & Padma B.( 2014) ,  Hiding Image in Image by using FMM with LSB Substitution in Image Steganography , International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, Issue 11.
 
3.       Snehal O.Mundhada, V. K.Shandilya (2012).Spatial and Transformation Domain Techniques for Image Enhancement. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2 , ISSN: 2319-5967.
 
4.       Ankit Dhamija; Vijay Dhaka (2016).A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). 978-1-4673-7910-6/15/$31.00 ,2015 IEEE.
 
5.        Haider M. Al-Mashadi, Ala'a A. Khalaf .(2018) .Hybrid Homomorphic Cryptosystem For Secure Transfer Of Color Image On Public Cloud . Journal of Theoretical and Applied Information Technology. Vol.96. No 19. ISSN: 1992-8645.
 
6.       Iman Qays Abduljaleel.(2016).Using IWT and LSB Method to Hide Encrypted image in Color image . Journal of Basrah Researches ((Sciences)) Vol. (42). No. (1) A.
 
7.      Yani Parti Astuti ; De Rosal Ignatius Moses Setiadi ; Eko Hari Rachmawanto ; Christy Atika Sari (2018). Simple and secure image steganography using LSB and triple XOR operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT). Publisher: IEEE. Yogyakarta, Indonesia.
 
8.       Bairai, A. K.( 2011), ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security, ISSN:2078-5828 (Print), ISSN 2218- 5224 (Online), Vol.01,No.2, , pp:37-41, Manuscript Code: 110112.
 
9.      Qiang Zhang , Ling Guo, Xiaopeng Wei, (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, Vol. 52, PP. 2028–2035.
 
10.Adinarayana Reddy Ka, Vishnuvardhan Bb, Madhuviswanathamc, Krishna A. V. N.d (2012) .A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology 4(2012) 114 – 118. 2212-0173 © 2012 Published by Elsevier Ltd. doi: 10.1016/j.protcy.2012.05.016 .
 
11.  Raouf Hamzaoui, Dietmar Saupe . (2006). Barni, Mauro, ed. Fractal Image Compression. Document and Image Compression. 968. CRC Press. pp. 168–169. ISBN 9780849335563. Retrieved 5 April 2011.
 
12.  Haider M. Al-Mashhadi.(2017).Quality Assessment for Image Encryption Techniques using Fuzzy Logic System.  International Journal of Computer Applications,Vol. 157, No 5 .
 
13.  Haider M. Al-Mashhadi; Iman Q. Abduljaleel.(2017) .Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences. 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani – Iraq. 978-1-5386-2955-0/17/$31.00 ©2017 IEEE.
 
1.      Gotfried C. Prasetyadi ; Achmad Benny Mutiara ; Rina Refianti (2018) ,File encryption and hiding application based on advanced encryption standard (AES) and append insertion ,steganography method . 2017 Second International Conference on Informatics and Computing (ICIC), Jayapura, Indonesia.
 
2.     Sevierda Raniprima ; Bambang Hidayat ; Nur Andini (2017).Digital image steganography with encryption based on rubik's cube principle. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). Bandung, Indonesia.
 
3.       Praneeta D., & Padma B.( 2014) ,  Hiding Image in Image by using FMM with LSB Substitution in Image Steganography , International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, Issue 11.
 
4.       Snehal O.Mundhada, V. K.Shandilya (2012).Spatial and Transformation Domain Techniques for Image Enhancement. International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2 , ISSN: 2319-5967.
 
5.       Ankit Dhamija; Vijay Dhaka (2016).A Novel Cryptographic and Steganographic Approach for Secure Cloud Data Migration. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). 978-1-4673-7910-6/15/$31.00 ,2015 IEEE.
 
6.        Haider M. Al-Mashadi, Ala'a A. Khalaf .(2018) .Hybrid Homomorphic Cryptosystem For Secure Transfer Of Color Image On Public Cloud . Journal of Theoretical and Applied Information Technology. Vol.96. No 19. ISSN: 1992-8645.
 
7.       Iman Qays Abduljaleel.(2016).Using IWT and LSB Method to Hide Encrypted image in Color image . Journal of Basrah Researches ((Sciences)) Vol. (42). No. (1) A.
 
8.      Yani Parti Astuti ; De Rosal Ignatius Moses Setiadi ; Eko Hari Rachmawanto ; Christy Atika Sari (2018). Simple and secure image steganography using LSB and triple XOR operation on MSB. 2018 International Conference on Information and Communications Technology (ICOIACT). Publisher: IEEE. Yogyakarta, Indonesia.
 
9.       Bairai, A. K.( 2011), ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security, ISSN:2078-5828 (Print), ISSN 2218- 5224 (Online), Vol.01,No.2, , pp:37-41, Manuscript Code: 110112.
 
10. Qiang Zhang , Ling Guo, Xiaopeng Wei, (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, Vol. 52, PP. 2028–2035.
 
11.Adinarayana Reddy Ka, Vishnuvardhan Bb, Madhuviswanathamc, Krishna A. V. N.d (2012) .A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology 4(2012) 114 – 118. 2212-0173 © 2012 Published by Elsevier Ltd. doi: 10.1016/j.protcy.2012.05.016 .
 
12.  Raouf Hamzaoui, Dietmar Saupe . (2006). Barni, Mauro, ed. Fractal Image Compression. Document and Image Compression. 968. CRC Press. pp. 168–169. ISBN 9780849335563. Retrieved 5 April 2011.
 
13.  Haider M. Al-Mashhadi.(2017).Quality Assessment for Image Encryption Techniques using Fuzzy Logic System.  International Journal of Computer Applications,Vol. 157, No 5 .
 
14.  Haider M. Al-Mashhadi; Iman Q. Abduljaleel.(2017) .Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences. 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani – Iraq. 978-1-5386-2955-0/17/$31.00 ©2017 IEEE.