[1] B. Abd-El-Atty, A.M. Iliyasu, H. Alaskar, A. El-Latif and A. Ahmed, A robust quasi-quantum walks-based
steganography protocol for secure transmission of images on cloud-based E-healthcare platforms, Sensors 20(11)
(2020) 3108.
[2] A. Abdulbaqi, M. Younis, Y. Younus and A. Obaid, A hybrid technique for EEG signals evaluation and classification as a step towards to neurological and cerebral disorders diagnosis, Int. J. Nonlinear Anal. Appl. 13(1)
(2022) 773–781.
[3] M.N. Abdulwahedand, S.T. Mustafa and M.S.M. Rahim, Image spatial domain steganography: A study of performance evaluation parameters, IEEE 9th Int. Conf. Syst. Engine. Technol. (2019) 309–314.
[4] A. Alabaichi, M.A.A.K. Al-Dabbas, A. Salih, Image steganography using least significant bit and secret map
techniques, Int. J. Elect. Comput. Engin. 10(1) (2020) 935–946.
[5] T. AlKhodaidi A. Gutub, Refining image steganography distribution for higher security multimedia counting-based
secret-sharing, Multimedia Tools and Appl. (2020) 1–31.
[6] S. Chatterjee, M. Biswas, D. Maji, B.K. Ghosh and R.K. Mandal, Logarithm similarity measure based automatic
esophageal cancer detection using discrete wavelet transform, Recent Trends and Advances in Artificial Intelligence
and Internet of Things (2020) 427–453.
[7] Q.S. Hamad, M.Q. Mohammed and S.Q. Muhamed, Surface water pollution monitoring system based on IOT,
Plant Arch. 20(2) (2020) 630–634.
[8] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in
fingerprints based steganography, Proc. 3rd Int. Symp. Computer Sci. Intell. Control (2019) 1–8.[9] M.M. Hashim and M. Rahim, Image steganography based on odd/even pixels distribution scheme and two parameters random function, J. Theore. Appl.Inf. Technol. 95(22) (2017).
[10] M.M. Hashim, S.H. Rhaif, A.A. Abdulrazzaq, A.H. Ali, M.S. Taha, Based on IoT healthcare application for
medical data authentication: Towards a new secure framework using steganography, IOP Conf.Ser.: Materials Sci.
Engin. 881(1) (2020) 012120.
[11] M. Hassaballah, M.A. Hameed and M.H. Alkinani, Introduction to digital image steganography, Digital Media
Stegan. (2020) 1–15.
[12] R.K. Hussein, A. Alenezi, H.F. Atlam, M.Q. Mohammed, R.J. Walters and G.B. Wills, Toward confirming a
framework for securing the virtual machine image in cloud computing, Adv. Sci. Technol. Eng. Syst. J. 2(4)
(2017) 44–50.
[13] M. Hussain and M. Hussain, A survey of image steganography techniques, Int. J. Adv. Sci. Tech. 54 (2013).
[14] M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, Image steganography in spatial domain: A
survey, Signal Processing: Image Communication, Signal Processing-Image Commun., 65 (2018) 46–66.
[15] M. Islam, R. Amarjit and R.H. Laskar, Neural network based robust image watermarking technique in LWT
domain, J. Intell. Fuzzy Syst., 34(3) (2018) 1691–1700.
[16] D. Jude Hemanth, J. Anitha, D.E. Popescu and L.H. Son, A modified genetic algorithm for performance improvement of transform based image steganography systems, J. Intell. Fuzzy Syst. 35(1) (2018) 197–209.
[17] I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research, Neurocomput. 335 (2019) 299–326.
[18] B. Karthikeyan, P. Nishmitha, B. Poojasree and S. Asha, Authentication of secret message using Rabin-Karp in
image steganography, Int. Conf. Intell. Comput. Control Syst. (2019) 388–391.
[19] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud based IoT smart healthcare system for remote patient monitoring,
EAI Endorsed Trans. Pervasive Health Technol. (2021) 1–11.
[20] N. Manohar and P.V. Kumar, Data encryption and decryption using steganography, 4th Int. Conf. Intell. Comput.
Control Syst. (2020) 697–702.
[21] M.Q. Mohammed, S.Q. Muhamed, M. Ievlanov and Z. Gazetdinova, Improvement of the method of scenario
analysis of functional requirements to an information system, Eastern-European J. Enterprise Technol. 3(2(99))
(2019) 25–35.
[22] B.S. Mohan, A.A. Mahmood, M.Q. Mohammed and N.D. Zaki, Replicating the MAP kinase cascade in membrane
computing, J. Phys.: Conf. Ser. 1963(1) (2021) 012156.
[23] S.Q. Muhamed, M.Q. Mohammed, M. Evlanov and H. Kliuchko, The ADALINE neuron modification for solving
the problem on searching for the reusable functions of the information system, Eastern-European J. Enterprise
Technol. 3(2(93)) (2018) 25–32.
[24] S.Q. Muhamed, M.Q. Mohammed, T. Nayl, D. Mikhnov and A. Mikhnova, Technology of structural optimization
for subsidiary in enterprise information systems, Int. J. Adv. Trends Comput. Sci. Engin. 8(1) (2019) 544–549.
[25] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, A novel magic LSB substitution method (MLSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tool. Appl. 75 (2016)
14867–14893.
[26] H. Nyeem, Reversible data hiding with image bit-plane slicing, 20th Int. Conf. Comput. Inf. Technol. (2018) 1–6.
[27] J. Qin, Y. Luo, X. Xiang, Y. Tan H. Huang, Coverless image steganography: A survey, IEEE Access 7 (2019)
171372–171394.
[28] A.K. Sahu and G. Swain, A novel n-rightmost bit replacement image steganography technique, 3D Res. 10(1)
(2019).
[29] A.K. Sahu and G. Swain, An optimal information hiding approach based on pixel value differencing and modulus
function, Wireless Personal Commun. 108(1) (2019) 159–74.
[30] P. Shah, P. Choudhari and S. Sivaraman, Adaptive wavelet packet based audio steganography using data history,
IEEE Region 10 and the Third Int. Conf. Indust. Inf. Syst. (2008) 1–5.
[31] G.J. Simmons, The prisoners’ problem and the subliminal channel, Adv. Crypt. (1984) 51–67.
[32] B. Stoyanov and B. Stoyanov, Boost: Medical image steganography using nuclear spin generator, Entropy 22(5)
(2020) 501.
[33] W. Su, J. Ni, X. Hu J. Fridrich, Image steganography with symmetric embedding using gaussian Markov random
field model, IEEE Trans. Circuit.Syst. Video Technol. 5 (2020).
[34] G. Swain, Adaptive and non-adaptive PVD steganography using overlapped pixel blocks, Arab. J. Sci. Engin. 43(12)
(2018) 7549–7562.
[35] M.S. Taha, M.S.M. Rahim, M.M. Hashim and H.N. Khalid, Information hiding: A tools for securing biometric
information, Technol. Rep. Kansai Univ. 62(04) (2020) 1383–1394.[36] https://www.nlm.nih.gov/.