1. A. Kumar, R. Sharma, A secure image steganography based on rsa algorithm and hash-lsb technique. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 363–372 (2013)
2. S. Kumari, A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. 6, 20915–20919 (2017)
3. A. Kahate, Crypt. Netw. Secur. 6, 1–480 (2008) (Tata McGraw-Hill )
4. A. Karki, A comparative analysis of public key cryptography. Int. J. Modern Comput. Sci. 4, 30–35 (2016)
5. P. Jovanovic, Analysis and design of symmetric cryptographic algorithms. Doctoral thesis from Computer Science and Mathematics of the University of Passau (2015), pp. 1–216