1. Abuelyman, E. S., & Alsehibani, A. A. S. (2008). An optimized implementation of the S-Box using residue of prime numbers. International Journal of Computer Science and Network Security, 8(4), 304–309.
2. Avcibas, I., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2), 221–229.
3. Alam, G. M., Mat Kiah, M. L., Zaidan, B. B., Zaidan, A. A., & Alanazi, H. O. (2010). Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. International Journal of Physical Sciences, 5(21), 3254–3260.
4. Cui, L., & Cao, Y. (2007). A new S-box structure named affine-power-affine. International Journal of Innovative Computing, Information and Control, 3(3), 45–53.
5. Chen, S. Y., Lin, W. C., & Chen, C. T. (1991). Split and merge image segmentation based on localized feature analysis and statistical tests. CVGIP: Graphical Models and Image Processing, 53(5), 457–475.