[1] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E. S. M. El- Rabaie and G. M. El-Banby, High security data
hiding using image cropping and LSB least significant bit steganography, Colloq. Inf. Sci. Tech. (2017) 400–404.
[2] Sh. M. Abo Mousa, LSBs steganography based on R-Indicator, M.Sc. Thesis, Faculity of Information Technology,
the Islamic University-Gaza, 2017.
[3] M. O. Alsadeg Ali, Visual cryptography scheme for color images using Arnold mapping and modified RSA algorithm, M.Sc. Thesis, Sudan University of Science and Technology, 2018.
[4] Q. S. Alsaffar, H. N. Mohaisen and F. N. Almashhdini, An encryption based on DNA and AES algorithms for
hiding a compressed text in colored Image, IOP Conf. Series Materials Sci. Engin. 1058(1) (2021) 012048.
[5] S. O. Alsharkasi, M. M. Elsheh and F. O. Ehtiba, Evaluation of using steganography technique to hide a text in
grayscale digital images, J. Acad. Res. Appl. Sci. 19 (2021) 1–6.
[6] Ambika, R. L. Biradar, V. Burkpalli, Efficient approach for steganography using DWT and RSA algorithm, Int.
J. Engin. Adv. Tech. 8(5)(2019) 1435–1443.
[7] S. Asjad, RSA Algorithm, University of South-Eastern Norway Campus Kongsberg, (2019).
[8] B. Chitradevi, N. Thinaharan and M. Vasanthi, Data hiding using least significant bit steganography in digital
images, Statistical Approaches on Multidisciplinary Research, 2017.
[9] M. Evans, RSA Encryption, Australian Mathematical Sciences Institute (AMSI), 2013.
[10] R. Halder, S. Sengupta, S. Ghosh and D. Kundu, A secure image steganography based on RSA algorithm and
hash-LSB technique, IOSR J. of Comput. Engin. 18(1) (2016) 39–43.
[11] M. Juneja and P. S. Sandhu, An improved LSB based steganography technique for RGB color images, Int. J.
Comput. Commun. Engin. 2(4) (2013) 513–517.
[12] F. Koeune, Pseudo-Random Number Generator, In: H. C. A. van Tilborg (eds) Encyclopedia of Cryptography
and Security Springer, Boston, MA, 2005.
[13] K. Kordov and S. Zhelezov, Steganography in color images with random order of pixel selection and encrypted
text message embedding, Peer J. Comput. Sci. 7 (2021) e380.
[14] D. Lehmer, Mathematical methods in large-scale computing units, In: U. S. N. D. B. o. Ordnance and H. University
(eds) Proceedings of the second symposium on large-scale digital computing machinery, Harvard University, 1951,
141–146.
[15] L. Li, B. Luo, Q. Li and X. Fang, A color images steganography method by multiple embedding strategy based on
sobel operator, 1st Int. Conf. Mult. Inf. Network. Secur. 2(1) (2009) 118–121.
[16] R. Lin and SH. Li, An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm, Secur.
Commun. Networks (Hindawi), 2021 (2021).[17] S. Manaseer, A. Aljawawdeh and D. Alsoudi, A new image steganography depending on reference and LSB, Int.
J. Appl. Engin. Res. 12(9) (2017) 1950–1955.
[18] S. Majumder and M. M. Rahman, Implementation of security enhanced image steganography with the incorporation of modified RSA algorithm, Int. Conf. Elect. Comput. Commun. Engin. (2019) 1–5.
[19] H.N. Mohaisen, Secure data hiding technique using steganography and watermarking, M.SC. Thesis, College of
Science, Baghdad University, 2016.
[20] S.A. Naji, H.N. Mohaisen, Q.S. Alsaffar and H.A. Jalab, Automatic region selection method to enhance imagebased steganography, Period. Engin. Natural Sci. 8(1) (2020) 67–78.
[21] M. E. Saleh, A. A. Aly and F. A. Omara, Data security using cryptography and steganography techniques, Int. J.
Adv. Comput. Sci. Appl. 7(6) (2016) 390–397.
[22] Y. M. Wazery, S.G. Haridy and A.A. Ali, A hybrid technique based on RSA and data hiding for securing handwritten signature, Int. J. Adv. Comput. Sci. Appl. 12(4) (2021).
[23] G. Ye, H. Wu, K. Jiao and D. Mei, Asymmetric image encryption scheme based on the Quantum logistic map
and cyclic modulo diffusion, Math. Biosci. Engin. 18(5) (2021) 5427–5448.