1. Al-Anie, H.K., Alia, M.A., Hnaif, A.A.: E-voting protocol based on public key cryptography. Int. J. Netw. Secur. Appl. (IJNSA) 3(4), 87–98 (2011)
2. Abdulzahra, H., Ahmad, R., Noor, N.M.: Combining cryptography and steganography for data hiding in images. Appl. Comput. Sci. 128–135 (2014). ISBN: 978-960-474- 368-1
3. Abd-alrazzq, H.K., Ibrahim, M.S., Dawood, O.A.: Secure internet voting system based on public key Kerberos. IJCSI Int. J. Comput. Sci. Issues 9(2), 428–435 (2012). No 3
4. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. Mag. 31(2), 26–34 (1998)
5. Lecture Notes in Computer Science;M Naor,1995