1. Kadhim, Q.K.: Image compression using discrete cosine transform method. Int. J. Comput. Sci. Mobile Comput. 5(9), 186–192 (2016)
2. Anupriya, E., Soni, S., Agnihotri, A., Babelay, S.: Encryption using XOR based extended key for information security – a novel approach. Int. J. Comput. Sci. Eng. 3(1), 146–154 (2011). ISSN: 0975-3397
3. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
4. Daemen, J., Rijmen, V.: The Design of Rijndael: AES-The Advanced Encryption Standard. Springer, Germany (2002)
5. Draksharam, S., Katravulapalli, D., Rohith Krishna, K., Thanikaiselvan, V.: Analysis of hybrid chaotic image encryption, vol. 18, pp. 697–703. IEEE (2018)