References
[1]. Abdullah, A. (2017). Advanced encryption standard
(AES) algorithm to encr ypt and decr ypt data.
Cryptography and Network Security.
[2]. Agarsana, B. G., Anjali, T. K., & Kirthika, M. S. S. (2018).
Image steganography using secured force algorithm for
hiding audio signal into colour image. International
Research Journal of Engineering and Technology, 05(02),
1-5.
[3]. Ali, U. A. M. E., Sohrawordi, M., & Uddin, M. P. (2019). A
robust and secured image steganography using LSB and
random bit substitution. American Journal of Engineering
Research, 8, 39-44.
[4]. Almazaydeh, W. I. A., & Sheshadri, H. (2016). Image
steganography using LSB, LSB+Huffman code, and
LSB+Arithmetic code. International Journal of Computer
Applications, 155(11), 1–7. https://doi.org/10.5120/ijca2
016911478
[5]. Al-Mazaydeh, W. I. A. (2014). Image steganography
using LSB and LSB+Huffman code. International Journal
of Computer Applications, 99(5), 17-22. https://doi.org/
10.5120/17370-7896
[6]. Al-Najjar, Y. A., & Soong, D. C. (2012). Comparison of
image quality assessment: PSNR, HVS, SSIM, UIQI.
International Journal of Scientific Engineering and
Research, 3(8), 1-5.
[7]. Azad, V., & Sharma, P. (2014). A review on objective
image quality assessment techniques. International
Journal of Emerging Engineering Research and
Technology, 2(5), 188-192.
[8]. Basahel, A. M., Yamin, M., & Abi Sen, A. A. (2019).
Enhancing security of transmitted data by improved
steganography method. International Journal of
Computer Science and Network Security (IJCSNS), 19(4),
239-244.
[9]. Chandra, S., & Paira, S. (2019). Secure transmission of
data using image steganography. Journal of Image
Video Process, 10(1), 2049-2053. https://doi.org/10.2191
7/ijivp. 2019.0291
[10]. Deepika, A.,& Kaur, G. (2016). Review paper on enhancing data security for cloud environment
cryptography and steganography technique. International
Journal of Applied Science and Engineering, 2(1), 44–48.
[11]. Emam, M. M., Aly, A. A., & Omara, F. A. (2016). An
improved image steganography method based on LSB
technique with random pixel selection. International
Journal of Advanced Computer Science & Applications,
1(7), 361-366. https://doi.org/10.14569/IJACSA.2016.070
350
[12]. Goswami, P., & Madan, S. (2017). A survey on big
data & privacy preserving publishing techniques.
Advances in Computational Sciences and Technology,
10(3), 395-408.
[13]. Hameed, M. A., Hassaballah, M., Aly, S., & Awad, A.
I. (2019). An adaptive image steganography method
based on histogram of oriented gradient and PVD-LSB
techniques. IEEE Access, 7, 185189-185204. https://doi.
org/10.1109/ACCESS.2019.2960254
[14]. Hemalatha, S., Acharya, D. U., Renuka, A., &
Kamath, P. R. (2013). A secure and high capacity image
steganography technique. Signal Image Process, 4(1),
83–89. https://doi.org/10.5121/sipij.2013.4108
[15]. Hore, A., & Ziou, D. (2010, August). Image quality
th metrics: PSNR vs. SSIM. In 2010, 20 International
Conference on Pattern Recognition (pp. 2366-2369).
IEEE. https://doi.org/10.1109/ICPR.2010.579
[16]. Kumar, R., Sharma, G., & Sanduja, V. (2018). A real
time approach to compare PSNR and MSE value of
different original images and noise (salt and pepper,
speckle, gaussian) added images. International Journal
of Latest Technology in Engineering, Management and
Applied Science, 7, 43-46.
[17]. Maganbhai, P. A. K., & Chouhan, K. (2015). A study
and literature review on image steganography.
International Journal of Computer Science and
Information Technologies, 6(1), 685-688.
[18]. Maheswari, S. U., & Hemanth, D. J. (2015). Different
methodology for image steganography-based data hiding. International Journal of Information and
Communication Technology, 7(4-5), 521-536. https://doi.
org/10.1504/IJICT.2015.070330
[19]. Nashat, D., & Mamdouh, L. (2019). An efficient
steganographic technique for hiding data. Journal of the
Egyptian Mathematical Society, 27(1), 1-14. https://doi.
org/10.1186/s42787-019-0061-6
[20]. Osunade, O., & Adeniyi, G. I. (2016). Enhancing the
least significant bit (LSB) algorithm for steganography.
International Journal of Computer Applications, 149(3),
1–8. https://doi.org/10.5120/ijca2016911363
[21]. Pavani, M., Naganjaneyulu, S., & Nagaraju, C.
(2013). A survey on LSB based steganography methods.
International Journal of Engineering and Computer
Science, 2(08), 2464-2467.
[22]. Pujari, A. A., & Shinde,S. S. (2016). Data security using
cryptography and steganography. IOSR Journal of
Computer Engineering, 18(04), 130–139. https://doi.org/
10.9790/0661-180405130139
[23]. Rahman, M. S., Khalil, I., Yi, X., & Gu, T. (2019). A
novel privacy preserving search technique for stego data
in untrusted cloud. In The Hawaii International
Conference on System Sciences. https://doi.org/10.2425
1/HICSS.2019.513
[24]. Reddy, D. L. K. D. A., & Jilani, S. A. K. (2016).
Implementation of 128-bit AES algorithm in MATLAB.
International Journal of Engineering Trends and
Technology (IJETT), 33(3), 126-129. https://doi.org/10.144
45/22315381/IJETT-V33P223
[25]. Sara, U., Akter, M., & Uddin, M. S. (2019). Image
quality assessment through FSIM, SSIM, MSE and PSNR—a
comparative study. Journal of Computer and
Communications, 7(3), 8-18. https://doi.org/10.4236/jcc.
2019.73002
[26]. Singh, S., & Lekha, B. (2014). A simple
steganography technique for hiding data into image.
International Journal of Computer Trends & Technology,
2(6).