1. Furht, B., & Socek. D. (2003). A survey of multimedia security. Comprehensive report on. https://www.researchgate.net/profile/Borko_Furht/publication/228702662_A_Survey_of_Multimedia_Security/links/57b7020108aecd6720139bc4/A-Survey-of-Multimedia-Security.pdf.
2. Abusukhon, A., Talib, M., & Ottoum, I. (2012). Secure network communication based on text-to-image encryption. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(4), 263–271.
3. Anees, A., Hussain, I., Algarni, A., & Aslam, M. (2018). A robust watermarking scheme for online multimedia copyright protection using new chaotic map. Security and Communication Networks. https://doi.org/10.1155/2018/1840207.
4. Ahmed, F. & Anees, A. (2015). Hash-based authentication of digital images in noisy channels. In Robust image authentication in the presence of noise (pp. 1–42). Springer.
5. Selent, D. (2010). Advanced encryption standard. Rivier Academic Journal, 6(2), 1–14.