References
- Lakhtaria, K. (2001) Protecting computer network with encryption technique: a study. International Journal of u-and e-service, Science and Technology.,4, 43-52. https://link.springer.com/chapter/10.1007/978-3-642-20998-7_47
- Chan, A. A Security framework for privacy-preserving data aggregation in wireless sensor networks. ACM transactions on sensor networks. ,7. http://dl.acm.org/citation.cfm?id=1921623
- Goldwasser, S., Micali, S., Rivest, R. L. A Digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal of Computing., 17, 1998, 281-308. http://epubs.siam.org/doi/abs/10.1137/0217017?journalCode=smjcat
- Zaidan, B., Zaidan, A., Al-Frajat, A. and Jalab, H. On the differences between hiding information and cryptography techniques: an overview. Journal of Applied Sciences., 10, 2010, 1650-1655. 4http://www.oalib.com/paper/2734429.
- Singh, A., Gilhorta, R. Data security using private key encryption system based on arithmetic coding. International Journal of Network Security and its Applications (IJNSA)., 3, 2011, 58-67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf.
- Nithin, N., Anupkumar, M.B. and Hegde G. P. Image encryption based on FEAL algorithm. International Journal of Advances in Computer Science and Technology., 2, 2013, 14-20. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.8504
- Bani Younes, M. Ali and Jantan, A. Image encryption using block-based transformation algorithm. International Journal of computer science (IJCS), 35, 2008, 407-415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf
- Divya, V.V, Sudha, S.K. and Resmy, V.R. Simple and secure image encryption. International Journal of Computer Science Issues (IJCSI), 9, 2012, 286-289. https://www.academia.edu/7885840/Simple_and_Secure_Image_ Encryption
- Mishra, M., Mishra, P., Adhikary, M.C. and Kumar, S. Image encryption using Fibonacci-Lucas transformation. International Journal on Cryptography and Information Security (IJCIS), 2, 2012, 131-141. https://arxiv.org/abs/1210.5912
- Singh, A. and Gilhotra, R. Data security using private key encryption system based on arithmetic coding. International Journal of Network Security and its Applications (IJNSA)., 3, 2011, 58-67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf.
- Huang, L. Chi Lee, C. and Hwang, M. A n2+n MQV key agreement protocol. The International Arab Journal of Information Technology., 10, 2013, 137-142. http://ccis2k.org/iajit/PDF/vol.10,no.2/2-3015.pdf
- Torkaman, M.R.N. Kazazi, N.S. and Rouddini, A. Innovative approach to improve Hybrid Cryptography by using DNA steganography. International Journal on New Computer Architectures and Their Applications (IJNCAA)., 2, 2012, 224-235. https://pdfs.semanticscholar.org/d738/2a91716926cd978f2ca341cbad7964504177.pdf.
- Krishna, A.V. Time stamp based ECC encryption and decryption. The International Arab Journal of Information Technology., 11, 2014, 276–281. http://ccis2k.org/iajit/PDF/vol.11,no.3/4571.pdf
- Dutta, S., Chakraborty, S. and. Mahanti, N.C. A Novel method of hiding message using musical notes. The International Journal of Computer Applications., 1, 2010, 76-79. http://www.ijcaonline.org/archives/number16/338-510
- Yamuna, M., Sankar, A. Ravichandran, S. and Harish, V. Encryption of a Binary String using music notes and graph theory. International Journal of Engineering and Technology (IJET)., 5, 2013, 2920-2925. http://connection.ebscohost.com/c/articles/93330833/encryption-binary-string-using-music-notes-graph-theory.
- Dutta, S. Kumar, C. and Chakraporty, S. A Symmetric Key algorithm for cryptography using music. International Journal of Engineering and Technology (IJET)., 5, 2013, 3109-3115. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.411.4160
- Bh, P., Chandravathi, D., PRoja, P. Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz’s method. International Journal of Computer Science and Engineering., 2, 2010, 1904-1907. https://pdfs.semanticscholar.org/bc2f/1260888bfb5e83a8f14bfc296a9f3fa8c87f.pdf.
- Koblitz, N. Elliptic Curve cryptosystems. Mathematics of computation., 48, 1987, 203-209. http://www.ams.org/journals/mcom/1987-48-177/S0025-5718-1987-0866109-5/
- Koblitz, N. (1994) A Course in number theory and cryptography. Springer-Verlag, New York. http://plouffe.fr/simon/math/A%20Course%20in%20Num-ber%20Theory%20and%20Cryptography.pdf
- Kumar, K.M., Azam, M.S. Rasool, S. Efficient digital encryption algorithm based on matrix scrambling technique. International Journal of Network Security and its Applications (IJNSA)., 2, 2010, 30-41. http://airccse.org/journal/nsa/1010ijnsa03.pdf.
- Abusukhon, A., Talib, M. A Novel network security algorithm based on Private Key encryption. Proceeding of International Conference on Cyber Security, Cyber Warfare and Digital Forensic, 26-28 June, 2012, pp. 263-271, IEEE Xplore. http://www.iaeng.org/publication/WCECS2016/WCECS2016_pp410-414.pdf.
- Abusukhon, A. Talib, M. and Issa, O. Secure network communication based on text to image encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), The Society of Digital Information and Wireless Communications (SDIWC).,1, 2012, 263-271. https://www.scribd.com/document/208597964/Secure-Network-Communication-Based-on-Text-to-Image-Encryption.
- Abusukhon, A. Block cipher encryption for Text-to-Image encryption algorithm. International Journal of Computer Engineering and Technology (IJCET)., 4, 2013, 50-58. https://www.academia.edu/3807391/Block_cipher_encryption_for_text_to_image_algorithm.
- Lokeshwari, G., Susarla, S. & Kumar, S. Udaya “A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm”. Journal of Discrete Mathematical Sciences and Cryptography, Vol 18, No3, 2015. doi: 10.1080/09720529.2014.968367
- Abusukhon, A., Talib, M., and Nabulsi, M. Analyzing the efficiency of Text-to-Image encryption algorithm. International Journal of Advanced Computer Science and Applications (IJACSA), 3, 2012, 35–38. https://www.researchgate.net/profile/Ahmad_Abusukhon/publi-cation/282656545_Analyzing_the_Efficiency_of_Text-to-Image_Encryption_Algorithm/links/561659d308ae2467f6863420.pdf.
- Abusukhon, A., Talib, M. and Almimi, H. Distributed Text-to-Image encryption algorithm. International Journal of Computer Applications., 106, 2014, 1-5. http://research.ijcaonline.org/volume106/number1/pxc3899518.pdf.
- Abusukhon A. and Hawashin B. A Secure network communication protocol based on text to Barcode encryption algorithm. International Journal of Advanced Computer Science and Applications, 6, 2015, 64-70. http://thesai.org/Downloads/Volume6No12/Paper_9-A_Secure_Network_Communication_Protocol_Based_on_Text.pdf.
- Diffie W. and Hellman M. E. New Directions in Cryptography. IEEE Transactions on Information Theory. IT-22, 1976, 644-654. http://liris.cnrs.fr/~rthion/files/Enseignement/M2Com/Exem-plesArticles/Diffie76.pdf.
- Singh, S. and Jain, A. () Combination of RGB substitution for text to image encryption technique using AES. Spvryan’s International Journal of Engineering Science & Technology (SEST), 2. http://spvryan.org/archive/issue2volume2/01.pdf.
- Manjunath, N. and Hiremath, S.G. Image and Text Steganography Based on RSA and Chaos Cryptography Algorithm with Hash-LSB Technique”. International Journal of Electrical, Electronics and Computer Systems (IJEECS). Vol. 3, No. 5, pp 5-9, 2015. http://www.techrepublic.com/resource-library/whitepapers/image-and-text-steganography-based-on-rsa-and-chaos-cryptography-algorithm-with-hash-lsb-technique/.
- Arun, M., Azarudeen S. Mohamed and Nivek, T.N. “AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic”. International Journal of Recent Research in Science, Engineering and Technology. Vol. 1, No. 3 pp 37-42, 2015. https://www.ijrrset.com/upload/2015/june/2-AES-Modified.pdf.
- https://crypto.stackexchange.com/questions/32668/diffie-hellman-key-size-to-symmetric-formula/32671. [Accessed on 1-06-2017].