[1] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for
medical image encryption, J. Discrete Math. Sci. Crypt. 24(6) (2021) 1663–1673.
[2] R. Ahmad and N.S. Choubey, Review on image enhancement techniques using biologically inspired artificial
bee colony algorithms and its variants, In Lecture Notes in Computational Vision and Biomechanics, Springer:
Dordrecht, The Netherlands, 25 (2018) 249–271.[3] S. Aishwarya and S. Veni, Hardware implementation of EZW based image compression with Huffman coding, Int.
J. Engin. Sci. Innov. Tech. 2(5) (2013).
[4] M.M.S.A. Al-Momin, I.A. Abed and H.A. Leftah, A new approach for enhancing LSB steganography using bidirectional coding scheme, Int. J. Elect. Comput. Engin. 9(6) (2019) 5286–5294.
[5] J.A. Alvarez-Cedillo, T. Alvarez-Sanchez, M. Aguilar-Fernandez and J. Sandoval-Gutierrez, Many-core algorithm
of the embedded zerotree wavelet encoder, In Coding Theory, S. Radhakrishnan and M. Sarfraz (eds.) Rijeka:
Intech Open, 2020.
[6] A.A. Attaby, M.F.M. Ahmed and A.K. Alsammak, Data hiding inside JPEG images with high resistance to
steganalysis using a novel technique: DCT-M3, Ain Shams Engin. J. 9(4) (2018) 1965–1974.
[7] R. Baran, P. Partila and R. Wilk, Automated text detection and character recognition in natural scenes based
on local image features and contour processing techniques, international conference on intelligent human systems
integration, Springer, Cham, (2018) 42–48.
[8] R. Boujelbene, L. Boubchir and Y.B. Jemaa, Enhanced embedded zerotree wavelet algorithm for lossy image
coding, IET Image Proc. 13(8) (2019) 1364–1374.
[9] M.S. Chavan, N. Mastorakis, M.N. Chavan and M.S. Gaikwad, Implementation of SYMLET wavelets to removal
of Gaussian additive noise from speech signal, World Sci. Engin. Acad. Soc. (WSEAS) (2011) 37–41.
[10] A. Cherian and A. Sullivan, Sem-GAN: semantically-consistent image-to-image translation, Proc. IEEE Winter
Conf. Appl. Comput. Vis. (WACV) (2019) 1797–1806.
[11] E. Delp and O. Mitchell, Image compression using block truncation coding, Commun. IEEE Trans. 27 (1979)
1335–1342.
[12] V. Elamaran, Comparison of wavelet filters in image coding and denoising using dembedded zerotree wavelet
algorithm, Res. J. Appl. Sci., Engin. Tech. 4(24) (2012) 5449–5452.
[13] A.E. El-Sharkawey and M.E. Ali, Comparison Between (RLE & Huffman and DWT) Algorithms for Data Compression, 2019.
[14] R.G. Gallager, Claude E. Shannon: a retrospective on his life, work, and impact, Inf. Theory, IEEE Trans. 47(7)
(2001) 2681–2695.
[15] D. Gautam and A. Singh, Resourceful fast discrete hartley transform to replace discrete fourier transform with
implementation of DHT algorithm for VLSI architecture, Turkish J. Comput. Math. Educ. 12(10) (2021) 5290–
5298.
[16] L. Gong, C. Deng, S. Pan and N. Zhou, Image compression-encryption algorithms by combining hyper-chaotic
system with discrete fractional random transform, Optics Laser Tech. 103 (2018) 48–58.
[17] D. Grois and O. Hadar, Efficient region-of-interest scalable video coding with adaptive bit-rate control, Adv.
Multimedia 2013 (2013) 281593.
[18] K. Kalaiselvi, Image compression using SPIHT techniques, J. Math. Inf. 11 (2017) 147–153.
[19] H. Kanagaraj and V. Muneeswaran, Image compression using HAAR discrete wavelet transform, 5th Int. Conf.
Devices Circ. Syst. (2020) 271–274.
[20] B. Kanchanadevi and P.R. Tamilselvi, Post processing using enhanced discrete cosine transform for image compression, Int. J. Adv. Sci. Tech. 29(06) (2020) 9372–9386.
[21] M. Kaur and G.K. AP, A survey on implementation of discrete wavelet transform for image Ddnoising, Int. J.
Communi. Net. Sys. 2(1) (2013).
[22] K. Kaur and B. Kaur, A robust video compression algorithm for efficient data transfer of surveillance data, Int.
J. Engin. Res. Tech. 9(7) (2020).
[23] M.K.H. Kolekar, G.L. Raja and S. Sengupta, An introduction to wavelet-based image processing and its applications, In: M.K.H. Kolekar, G.L. Raja and S. Sengupta (eds), Computer Vision: Concepts, Methodologies, Tools,
and Applications, Hershey, PA: IGI Global (2018) 110–128.
[24] P. Kuldeep and S. Vivek, A survey of various image compression techniques, Indian J. Appl. Res. 5(1) (2015).
[25] J. Liu, Y. Ke, Z. Zhang, Y. Lei, J. Li, M. Li and X. Yang, Recent advances of image steganography with generative
adversarial networks, IEEE Access 8 (2020) 60575–60597.
[26] M.-m. Liu, M.-q. Zhang, J. Liu, Y.-n. Zhang and Y. Ke, Coverless information hiding based on generative
adversarial networks, CoRR (2017).
[27] Y. Luo, X. Ouyang, J. Liu and L. Cao, An image encryption method based on elliptic curve elgamal encryption
and chaotic systems, IEEE Access 7 (2019) 38507–38522.
[28] S. Majumdar, Comparative analysis of Coiflet and Daubechies wavelets using global threshold for image de-noising,
Int. J. Adv. Engin. Tech. 6 (2013) 2247–2252.
[29] Y. Minzhu, Z. Zhipu and H. Changpei, Research on lossless compression based on single-frame interferogram [J],
Modern Elect. Tech. 42(07) (2019) 57–60.[30] D. Napoleon, S. Sathya, M. Praneesh and M.S. Subramanian, Remote sensing image compression using 3D-SPIHT
algorithm and 3d-owt, Int. J. Comput. Sci. Engin. 4(05) (2012) 899–908.
[31] A.J. Oabid, S. AlBermany and N.O. Alkaam, Enhancement in S-Box of BRADG algorithm, In: V. Solanki, M.
Hoang, Z. Lu and P. Pattnaik (eds), Intelligent Computing in Engineering, Advances in Intelligent Systems and
Computing, Springer, Singapore, 1125 (2020).
[32] B.K. Pandey, D. Mane, V.K.K. Nassa, D. Pandey, S. Dutta, R.J.M. Ventayen, G. Agarwal and R. Rastogi, Secure
text extraction from complex degraded images by applying steganography and deep learning, In Multidisciplinary
Approach to Modern Digital Steganography, IGI Global, (2021).
[33] D. Pandey, V.K.K. Nassa, A. Jhamb, D. Mahto, B.K. Pandey, A.S.H. George, A.S. George and S. Bandyopadhyay,
An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego
images, Multidiscip. App. Modern Digital Steganog. (2021) 211–234.
[34] D. Pandey, B.K. Pandey and S. Wairya, Hybrid deep neural network with adaptive galactic swarm optimization
for text extraction from scene images, Soft Comput. 25 (2021) 1563–1580.
[35] B.K. Pandey, D. Pandey, S. Wairya and G. Agarwal, An advanced morphological component analysis, steganography, and deep learning-based system to transmit secure textual data, Int. J. Distrib. Artif. Intell. 13(2) (2021)
40–62.
[36] Z. Peng, G. Wang, H. Jiang and S. Meng, Research and improvement of ECG compression algorithm based on
EZW, Computer Methods Prog. Biomed.145 (2017) 157–166.
[37] D. Po lap, An adaptive genetic algorithm as a supporting mechanism for microscopy image analysis in a cascade
of convolution neural networks, Appl. Soft Comput. J. 97 (2020) 106824.
[38] Y. Pourasad and F. Cavallaro, A novel image processing approach to enhancement and compression of X-ray
images, Int. J. Environ. Res. Public Health 18(13) (2021) 6724.
[39] M. Rathee and A. Vij, Review of image compression techniques based on orthogonal transforms, Int. J. Engin.
Sci. and Innov. Tech. 3(4) (2014).
[40] A. Sahu and G. Swain, Dual stego-imaging based reversible data hiding using improved LSB matching, Int. J.
Intell. Eng. Syst. 12(5) (2019) 63–73.
[41] M.Y. Sashikala, A.S. Solomon and M.N. Nachappa, A survey of compression techniques, Int. J. Recent Tech.
Engin. 2(1) (2013).
[42] A. Savakis and R. Carbone, Discrete wavelet transform core for image processing applications, Proc. SPIE Int.
Soc. Optical Engin. (2005).
[43] Z. Songgang, G. feng, Y. Fulei and L. Xiaowei, Research on UAV video compression based on compression
algorithm [J], Integrated Circuit Appl. 36(04) (2019) 39–40.
[44] S. Suma and V. Sridhar, Computational modelling of image coding using ROI based medical image compression,
Int. J. Comput. Appl. 108(5) (2014) 20–27.
[45] D. VijendraBabu and N.R. Alamelu, Wavelet based medical image compression using ROI EZW, Int. J. Recent
Trends Engin. Tech. 1(3) (2009).
[46] Y. Xu and L. Xu, The performance analysis of wavelet in video coding system, Multimedia Technology (ICMT),
2011 Int. Conf. (2011) 878–883.
[47] M. Yang, W. Zhao, W. Xu, Y. Feng, Z. Zhao, X. Chen and K. Lei, Multitask learning for cross-domain image
captioning, IEEE Trans. Multimedia 21(4) (2019) 1047–1061.
[48] Y. Yu, M. Wang and D. Lima, Alcoholism detection in magnetic resonance imaging by Haar wavelet transform
and back propagation neural network, AIP Conf. Proc. (2018) 040012.
[49] R. Zhang, S. Dong and J. Liu, Invisible steganography via generative adversarial networks, Multimedia Tools
Appl. 78(7) (2019) 8559–8575.
[50] X. Zhou, Research on DCT-based image compression quality, Proc. 2011 Cross Strait Quad-Regional Radio Science
and Wireless Tech. Conf. (2011) 1490–1494.
[51] J. Zhu, R. Kaplan, J. Johnson and L. Fei-Fei, HiDDeN: Hiding data with deep networks, CoRR, 2018.