1. Rosaline, S.I., Rengarajaswamy, C.: A Steganographic substitution technique using APPM for encrypted pixels. In: International Conference on Information Communication and Embedded Systems (ICES), 21–22 February 2013. IEEE Explore (2013)
2. Bhalla, J.S., Nagrath, P.: Nested digital image watermarking technique using blowfish encryption algorithm. Int. J. Sci. Res. Publ. 3(4), 1–6 (2013)
3. Singh, A., Malik, S.: Securing data by using cryptography with steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 404–409 (2013).
http://www.ijarcsse.com
4. Tyagi, V., kumar, A., Patel, R., Tyagi, S., Gangwar, S.S.: Image steganography using least significant bit with cryptography. J. Glob. Res. Comput. Sci. 3(3), 53–55 (2012).
http://www.jgrcs.info
5. Abikoye Oluwakemi, C., Adewole Kayode, S., Oladipupo Ayotunde, J.: Efficient data hiding system using cryptography and steganography. Int. J. Appl. Inf. Syst. 4(11), 6–11 (2012).
http://www.ijais.org