References
- V. Shukla, A. Mishra, A new sequential coding method for secure data communication, 2020 IEEE international conference on computing, power and communication technologies [GUCON], 2020, DOI:https://doi.org/10.1109/GUCON48875.2020.9231252
- A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone, Handbook of applied cryptography, fifth edition, CRC press Inc., USA, ISBN: 9780849385230, 2001.
- W. Stallings, Cryptography and network security, principles and practices, seventh edition, Prentice Hall, ISBN-13:978-0134444284, ISBN-10:0134444280>, 2005.
- F.Y. Shih, Digital watermarking and steganography: fundamentals and techniques, CRC press, Inc. Boca Raton, FL, USA, ISBN:1420047574 9781420047578, 2007.
- R. Chandramouli, M. Kharrazi, N. Memon, Image steganography and steganalysis: concepts and practice, International workshop on digital watermarking, IWDW 2003: Digital Watermarking, 35-49, ISBN: 978-3-540-24624-4, Print ISBN: 978-3-540-21061-0, 2003, DOI: https://doi.org/https://doi.org/10.1007/978-3-540-24624-4_3.
- A. Shamir, On the generation of cryptographically strong pseudo-random sequences, International colloquium on automata, languages, and programming, 1981, 544-550, DOI: https://doi.org/https://doi.org/10.1007/3-540-10843-2_43
- V.V.D. Leest, E.V.D. Sluis, G.J. Schrijen, P. Tuyls, H. Handschuh, Efficient implementation of true random number generator based on SRAM PUFs, Cryptography and security: from theory to applications, Lecture notes in computer science book series (LNCS), volume 6805, 2012, 300-318, DOI: https://doi.org/https://doi.org/10.1007/978-3-642-28368-0_20
- https://in.mathworks.com/help/matlab/ref/randperm.html
- H. Huang, S. Yang, Image encryption technique combining compressive sensing with double random-phase encoding, volume 2018, article ID 6764052, 2018, 1-10, DOI: https://doi.org/https://doi.org/10.1155/2018/6764052
- F.A.P. Petitcolas, Kerckhoffs’ principle, Encyclopedia of cryptography and security, 2011, 663-706, DOI: https://doi.org/https://doi.org/10.1007/978-1-4419-5906-5_487.
- W. Zhijun, L. Wenjing, L. Liang, Y. Meng, Low-rate DoS attacks, detection, defense, and challenges: a survey, IEEE access, volume 8, 2020, 43920-43943, DOI:https://doi.org/10.1109/ACCESS.2020.2976609
- A. Bonguet, M. Bellaiche, A Survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing, Future internet, volume 9, 2017, 1-19, DOI: https://doi.org/https://doi.org/10.3390/fi9030043
- R. Horstmeyer, B. Judkewitz, I.M. Vellekoop, S. Assawaworrarit, C. Yang, Physical key-protected one-time pad, Scientific reports, volume 3, article number 3543, 2013, 1-6, DOI:https://doi.org/10.1038/srep03543
- D. Raub, R. Steinwandt, J.M. Quade, On the security and composability of the one time pad, International conference on current trends in theory and practice of computer science, 2005, 288-297, DOI: https://doi.org/https://doi.org/10.1007/978-3-540-30577-4_32
- B. Zhao, G. Guo, An encryption algorithm for user’s sensitive information resources in network database, Journal of Interdisciplinary Mathematics, volume 21, issue 5, 2018, 1255-1260, DOI: https://doi.org/https://doi.org/10.1080/09720502.2018.1495399
- N. Ayub, A. Selwal, An improved image steganography technique using edge based data hiding in DCT domain, Journal of Interdisciplinary Mathematics, volume 23, issue 2, 2020, 357-366, DOI: https://doi.org/https://doi.org/10.1080/09720502.2020.1731949