References
- Hamdan, M., Subaih, B., Alqadi, Z.: Extracting Isolated Words from an Image of Text. International Journal of Computer Science & Mobile Computing 5(11), 29-36 (2016)
- Hindi, A., Dr. Dwairi, M., Alqadi, Z.: Analysis of Procedures used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing 9(2), 21-37 (2020) https://doi.org/10.47760/ijcsmc.2020.v09i11.002
- Rushdi Abu Zneit, R., Al-Azzeh, J. Alqadi, Z., Ayyoub, B., Sharadqh, A.: Using Color Image as a Stego-Media to Hide Short Secret Messages. International Journal of Computer Science and Mobile Computing, vol. 8, issue 6, pp. 106-123, 2019.
- Patel, K.: Performance analysis of AES, DES and Blowfish cryptographic algorithms on small and large data files. International Journal of Information Technology 11, 81--819 (2019). https://doi.org/10.1007/s41870-018-0271-4
- Rani, R., Sharma, G.: Review Paper on Data Hiding In 3D Barcode Image Using Steganography. International Journal of Advanced Research in Computer Science 8(5), 2271-2276 (2017)
- Ghodke, M., Mali, N.: FPGA Based Network Security Using Cryptography. International Research Journal of Engineering and Technology 3(3):469-71 (2016)
- Bhuvaneshwari, M., Tenmozhi, S.: A VLSI architecture for security based stenographic processor with AES algorithm. International Journal of Electrical and Computer Engineering; 1-6.
- Sukhraliya, V., Chaudhary, S.: Encryption and decryption using ASCII values with substitution array approach. International Journal of Advanced Research in Computer and Communication Engineering. 2(8) 3094-3097 (2013)
- Shaikh, A. P, Kaul, V.: Enhanced Security Algorithm using Hybrid Encryption and ECC. IOSR Journal of Computer Engineering (IOSR-JCE) 16(3), 80-85 (2014) https://doi.org/10.9790/0661-16348085
- Garg, SK.:, Modifed encryption and decryption using symmetric keys at two stages: Algorithm SKG 1.2. International Journal of Advanced Research in Computer Science and Electronics Engineering. 4(6),778-80 (2014)
- Enriquez, M., Garcia, D. W., Arboleda, E.:, Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems. Indian Journal of Science and Technology 10(27), 1-14 (2017) DOI: 10.17485/ijst/2017/v10i27/105001.
- Vijayalakshmi, C., Lavanya, L., Navya, C.: A Hybrid Encryption Algorithm Based On AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering 4(1), 909-917 (2016)
- Li, P., Chen, Z., Yang, L. T., Zhao, L. , and Zhang, Q.: A Privacy-preserving High-order Neuro-fuzzy C-means Algorithm with Cloud Computing. Neurocomputing 256, pp. 82-89 (2017) https://doi.org/10.1016/j.neucom.2016.08.135
- Yin, S., and Liu, J.: A K-means Approach for Map-reduce Model and Social Network Privacy Protection. Journal of Information Hiding and Multimedia Signal Processing 7(6), 1215-1221 (2016)
- Zhang, Q., Yang, L. T., Chen, L. T. and Li, P.: High-order Possibilistic c-means Algorithms Based on Tensor Decompositions for Big Data in IoT. Information Fusion 39, 72-80 (2018) https://doi.org/10.1016/j.inffus.2017.04.002
- Teng, L., Li, H., Liu, J., and Yin, S.: An Efficient and Secure Cipher-text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-attribute Sorting Method. International Journal of Network Security 20(5), 872-878 (2018)
- Elgendy, I., Zhang, W., Liu, C., and Hsu, C.: An Efficient and Secured Framework for Mobile Cloud Computing. IEEE Transactions on Cloud Computing 9(1), 79-87 (2018) https://doi.org/10.1109/TCC.2018.2847347
- B. Karthikeyan, T. Sasikala, and S. B. Priya, "Key exchange techniques based on secured energy efficiency in mobile cloud computing," Applied Mathematics & Information Sciences, vol. 13, no. 6, pp. 1039-1045, 2019. https://doi.org/10.18576/amis/130618
- Xu, J. Wei, L., Wu, W., Wang, A., Zhang, Y., and Zhou ,F.: Privacy-preserving Data Integrity Verification by using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System. Future Generation Computer Systems 108, pp. 1287-1296 (2020) https://doi.org/10.1016/j.future.2018.04.018
- Haseeb, K., Almgren, A., Ud Din, I., Islam, N., and Altameem, A.: SASC: Secure and Authentication-based Sensor Cloud architecture for intelligent Internet of Things. Sensors 20(9), pp. 2468-2486 (2020) https://doi.org/10.3390/s20092468
- Zhu, H., Yuan, Y., Chen, Y., et al.: A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7, pp.9003-90044 (2019)
- Zhang, Z., and Luo, J.: A Data Value Classification and Encryption Mechanism Based on Metadata Attributes. Journal of Northwest University 46(2) pp. 188-194 (2016)
- Liu, T., Liu, Y. Mao, Y. et al.: A Dynamic Secret-based Encryption Scheme for Smart Grid Wireless Communication. IEEE Transactions on Smart Grid 5(3), 1175-1182 (2014). https://doi.org/10.1109/TSG.2013.2264537