[1] ArunaVaranasi,M., March 2014.Lakshmi Anjana and Pravallika Pasupulate, “Image Steganography with Cryptography using Multiple Key Patterns,International Journal of Computer Applications (0975 - 8887) 90 -
[2] Amiruddin,December, 2017.New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks,International Journal of Communication Networks and Information Security (IJCNIS) 9 -
[3] UmarMujahid,M.,Islam,December, 2014.Ultralightweight Cryptography for Passive RFID Systems,International Journal of Communication Networks and Information Security (IJCNIS) 6 -
[4] ShamimAhmed,December, 2012.Laskar and Kattamanchi Hemachandran, “High Capacity data hiding using LSB Steganography and,International Journal of Database Management Systems 4 -
[5] S.K.Sabnis,R.N.Awale, 2016.Statistical Steganalysis of High Capacity Image Steganography with Cryptography,” 7th International Conference on Communication, Computing and Virtualization 321 -327
[6] PrashantKumar,Arya, 2015.Mahendra Singh Aswal and Vinod Kumar, “Comparative Study of Asymmetric Key Cryptographic Algorithms,International Journal of Computer Science & Communication Networks 5 17 -21
[7] ShilpaGupta,ISSN,July, 2012.Enhanced Least Significant Bit algorithm For Image Steganography”,International Journal of Computational Engineering & Management 15 2230 -7893
[8] Ki-HyunJung, February 2009.Steganographic method based on interpolation and LSB substitution of digital images,Computer Standards & Interfaces 31 465 -470
[9] G.Raj Kumar,M.Maruthi Prasada,T.Lalith,Kumar,Issue6,October-November, 2014.An Implementation of LSB Steganography Using DWT Technique,”,International Journal of Engineering Research and General Science, ISSN 2091- 2730 2 -
[10] ShilpaThakar,Issue12,December2013, .,International Journal of Advanced Research in Computer Science and Software Engineering 3 -
[11] GurpreetKaur, April 2013.Other Data Hiding Techniques,International Journal of Innovative Technology and Exploring Engineering 2 2278 -3075
[12] ChunlinSong, 2009PGNet.Recent Advances and Classification of Watermarking Techniques in Digital Images,”,ISBN: 978-1-902560- 22-9 -
[13] MariuszDzwonkowski, 2015.Michal Papaj and Roman Rykaczewski, “A New Quaternion-Based Encryption Method for DICOM Images”,IEEE Transactions on Image Processing, vo. 24 4614 -4622
[14] AnitaPradhan,K.Raja Sekhar, 2017.Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks,” Security and Communication Networks, 1 -13
[15] M.I.Khalil, August 2017.Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as a Variable Key”,International Journal of Communication Networks and Information Security (IJCNIS) 9 -
[16] P. M. Rubesh Anand,March, 2009.Real-Time Symmetric Cryptography using Quaternion Julia Set,International Journal of Computer Science and Network Security 9 -
[17] EckhardHitzer,, 2016.The Quaternion Domain Fourier Transform,Clifford Algebras 26 969 -984
[18] Bihan , N.L.,Sangwine , S.J., 2003."Quaternion principal component analysis of color images,",IEEE International Conference on Image Processing 1 809 -812
[19] EllT.A., 1993."Quaternion-Fourier transforms for analysis of two dimensional linear time-invariant partial differential systems,",in Proc. 32nd Con 1830 -1841