1. V.K Sharma, P.Mathur, DK.Srivastava, “Highly secure DWT steganography scheme for encrypted data hiding, ” Information and Communication Technology for Intelligent Systems,vol.1, pp. 665-673, 2019.
2. A.Gupta, S.Gupta, and N.Yadav, “Enhancement of security using B-RSA algorithm, ” Inventive Communication and Computational Technologies, pp.439-450, 2020.
3. M.Aghababaei and S. Jafarpourneshli, “Color Image Encryption Based on DNA Algorithm, ” 5th National Conference on Electrical and Mechatronic Engineering of Iran, Tehran, https://civilica.com/doc/988464,pp.1-20, 1398.
4. M.Rajaei and S.Zeidabadi Nejad, “Cryptography Using RSA Algorithm and the Remaining Chinese Theorem, ”5th National Conference on Electrical and Electronic Engineering of Iran, Gonabad, https://civilica.com/doc/219747, 2013.
5. Y.Pourasad, R.Ranjbarzadeh, A.Mardani, “A new algorithm for digital image encryption based on chaos theory, ” Entropy, vol.23,no.3,pp.1-16, 2021.
6. A.Kaur and G. Singh , “A random selective block encryption technique for secure image cryptography using blowfish algorithm, ” 2th International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 1290-1293, 2018.
7. M.J.Saddam, A.I. Abdullahi and A.Hamid Mohammed, “A Lightweight Image Encryption And Blowfish Decryption For The Secure Internet Of Things, ” 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT),pp.1-5, 2020.
8. F.H. Mohammed Sediq Al-Kadei, H. Abdalkaream Mardan and N. A. Minas, “Speed Up Image Encryption by Using RSA Algorithm, ” 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1302-1307, 2020.
9. Y.Liu,Z.Jiang,X.Xu,F.Zhang and J.Xu, “Optical image encryption algorithm based on hyper-chaos and public-key cryptography, ” Optics and Laser Technology, vol.127,no.7,pp.1-10, 2020.
10. Z.Xin, L.Dong, Y.Sheng, L.Da-hai, H.Jian-Ping, “A method for hiding information utilizing double random phase encoding technique, ”Optics and Laser Technology, vol .39,no.7,pp.1360-1363,2007.
11. S.Katzenbeisser, P.Fabien A.P, “Information Hiding Techniques for Steganography and Digital Watermarking, ”Artech House, pp.1-220, 2000.
12. J.Islampanah, S.N.Razavi, “Presenting a New Method for Image Encryption Using Fuzzy System, ” 3th National Congress of New Technologies of Iran with the Aim of Achieving Sustainable Development, Tehran, https://civilica.com/doc/463566, pp.1-19,2015.
13. M.Mitchell, “An introduction to genetic algorithms, ” MIT press,pp.1-209,1998.
14. MA.Ali, EH.Houssein, NA.Eldemerdash, AE, “Hassanien. Increasing the hiding capacity in image steganography using Braille code, ” International Journal of Intelligent Engineering Informatics,vol.5, no.4, pp.327-341, 2017.
15. X.Zhou, JG.Chen, “Information hiding based on double-random phase encoding technology, ” Journal of Modern Optics,vol.53,no.12,pp.1777-1783,2006.
16. K.Mishra, SK.Singh, P.Nagabhushan, “An improved SVD based image compression, ” Conference on Information and Communication Technology (CICT), pp. 1-5, 2018.
17. A.Alkholidi, A.Alfalou, H.Hamam, “ A new approach for optical colored image compression using the JPEG standards, ” Signal Processing, vol.87,no.4,pp.569-583,2007.
18. S.Chandra, S.Paira, S.Safikul Alam and G.Sanyal, “A Comparative Survey of Symmetric and Asymmetric Key Cryptography, ” International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp.83–93,2014.
19. S.Sharifi,M.Esmaeildoust, M. R.Taheri and K.Navi, “Efficient Implementation of RNS Montgomery Multiplication Using Balanced RNS Bases, ” Journal of Mathematics and Computer Science (JMCS), vol.12, pp.51–64,2014