1. Abdullah AM, Aziz RHH (2016) New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm. Int J Comput Appl 143(4):11–17
2. Al-hamami AH, Al-juneidi JY (2015) Secure mobile cloud computing based-on fingerprint. World Comput Sci Inform Technol J 5(2):23–27
3. Alsaadi IM (2015) Physiological biometric authentication systems, advantages, disadvantages and future development: a review. Int J Sci Technol Res 4(12):285–289
4. Archer J, Cullinane D, Puhlmann N, Boehme A, Kurtz P, Reavis J (2010) Top Threats to cloud computing V1.0. Cloud Security Alliance. pp 1–14
5. Advances in intelligent systems and computing;Y Bala,2018