1. Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., Handbook of applied cryptography, CRC press, Boca Raton, (1996).
2. Singh S.P., Bhatnagar G., Gurjar D.K., A secure image encryption algorithm based on polar decomposition, International Colloquium on Signal Processing & Its Applications, pp 135–139, (2018).
3. Singh, S.P. and Bhatnagar, G., A robust image hashing based on discrete wavelet transform, International Conference on Signal and Image Processing Applications (ICSIPA), pp. 440–444, (2017).
4. Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice-Hall, Upper Saddle River, (1999).
5. Katzenbeisser, S. and Petitcolas, F. A. P., Information hiding techniques for steganography and digital watermarking, Artech House, Boston, (2002).