References
[1]. Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, and
Ning Xu, (2014). “ACM Captcha as Graphical Passwords-A
New Security Primitive Based on Hard AI Problems”. IEEE
Transaction on Information Forensic and Security, Vol. 9,
No. 6.
[2]. G. Sudheer Reddy, G. Venkata Prasad, and V. Hari
Prasad, (2014). “Graphical Secure Password Method
against Online Password Hackers (Guessing Attacks)”.
IJCSNS International Journal of Computer Science and
Network Security, Vol. 14, No. 8.
[3]. Brijesh Kumar Singh, Nidhi Sharma, Neha Singla,
Nikita Sharma, and Neetu Choudhary, (2014). “Image
Encryption Using Block-Based Transformation Algorithm”.
IJISET- International Journal of Innovative, Science,
Engineering &Technology, Vol. 1, No. 3.
[4]. Vinay Sahu, and Kamlesh Lahre, (2013). “A New
Technique for enhancing Image Protection Using Digital
Watermarking”. IJITEE, Vol. 3.
[5]. Prerna Parmar, and Neeru Jindal, (2014). “Image
Security with Integrated Watermarking and Encryption”.
IOSR-JECE, Vol. 9.
[6]. Gurmeet Kaur and Aarti Kochhar, (2012). “A
Steganography Implementation based on LSB&DCT”.
IJSETT, Vol. 4, No. 1, pp. 35-41.
[7]. Israa Tahseen and Shatha Habeeb, (2012). “Proposal
New Approach for Blowfish Algorithm by Using Random
Key Generator”. Journal of Madent Alelem College, Vol.
4, No. 1, pp. 1-10.
[8]. Ratinder Kaur and V. K. Banga, (2012). “Image
Security using Encryption based Algorithm”. International
Conference on Trends in Electrical, Electronics and
Power Engineering (ICTEEP'2012), pp. 110-112.
[9]. B. Geethavani, E.V. Prasad and R. Roopa, (2013). “A
New Approach for Secure Data Transfer in Audio Signals
Using DWT”. IEEE.
[10]. Monika Agrawal and Pradeep Mishra, (2012). "A Modified Approach for Symmetric Key Cryptography
Based on Blowfish Algorithm”. International Journal of Engineering and Advanced Technology, Vol. 1, No. 6, pp.
79-83.