[1] M. Alasdair, An introduction to digital image processing with Matlab, Course Technology, 2004.
[2] M.A.F. Al-Husainy and D.M. Uliyan, Image steganography technique based on extracted chains from the secret key, J. Engin. Appl. Sci. 13 (2018), 4235–4244.
[3] S. Almuhammadi and A. Al-Shaaby, A survey on recent approaches combining cryptography and steganography Computer Science, Information Technology (CS IT), 2017.
[4] K.I. Al-Saif and A.S. Abdullah, Color image enhancement based on contourlet transform coefficients, Aust. J. Basic Appl. Sci. 7 (2013), no. 8, 207–213.
[5] P. Anita, Numerical analysis, National Institute of Technology Durgapur, Durgapur-713209.
[6] S. Adjerid, Notes for numerical analysis, Math 4445, Virginia Polytechnic Institute and State University.
[7] T.S. Barhoom and S.M. AMousa, A steganography lsb technique for hiding image within image using blowfish encryption algorithm, Int. J. Res. Eng. Sci. 3 (2015), 61–66.
[8] M. Douglas, K. Bailey, M. Leeney and K. Curran, An overview of steganography techniques applied to the protection of biometric data, Multi.Tools Appl. 77 (2018), 17333–17373.
[9] D. Gollmann, Computer security Wiley interdisciplinary reviews, Comput. Statist. 2 (2010), 544–554.
[10] M.M. Hashim, M.S.M. Rahim, F.A. Johi, M.S. Taha, A.A. Al-Wan and N.N. Sjarif, An extensive analysis and conduct comparative based on statistical attach of LSB substitution and LSB matching, Int. J. Engin. Technol. 7 (2018), 4008–4023.
[11] J. Katz, A.J. Menezes, P.C. Van Oorschot and S.A. Vanstone, Handbook of applied cryptography, CRC Press. 1996.
[12] I.A. Khalil and M.S. Meaad, Contourlet transformation for text hiding in hsv color image, Int. J. Comput. Networks Commun. Secur. 1 (2013), no. 4.
[13] S.A. Laskar and K. Hemachandran, Combining JPEG steganography and substitution encryption for secure data communication, Computer Science & Information Technology, 2012.
[14] W.R. Matthew, Pivoting for LU factorization, University of Puget Sound, 2014.
[15] S. Mishra, V.K. Yadav, M.C. Trivedi and T. Shrimali, Audio steganography techniques, A Survey in Advances in Computer and Computational Sciences, Springer, Singapore, 2018, p. 581–589.
[16] T. Morkel, Image steganography applications for secure communication Doctoral dissertation, University of Pretoria, 2012.
[17] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair, Secure image steganography using cryptography and image transposition, arXiv preprint arXiv:1510.04413. 2015.
[18] V. Nagarajan, N.K. Abitha Gladis and D. Nagarajan. Compression and denies of an image by LU and QR decomposition, Int. J. Res. Engin. Appl. Sci. 6 (2016), no. 9, 1–4.
[19] F.A.P. Petitcolas, Information hiding: a survey, Proc. IEEE 87 (1999), no. 7, 1062–1078.
[20] G. Phillip, M. Walter and H.W. Margaret, Numerical linear algebra and optimization, Addison-Wesley Publishing Company, 1991.
[21] M.H. Qasim, New Metrics for steganography algorithm quality, Int. J. Adv. Sci. Technol. 29 (2020), no. 2.
[22] L. Riccardo and B. Mauro, Lossless compression of encrypted grey-level and color images, 16th Eur. Signal Process. Conf. (EUSIPCO 2008), Lausanne, Switzerland, 25 (2008), no. 29, p. 1-5.
[23] D.R. Sridevi, P. Vijaya and K.S. Rao, Image steganography combined with cryptography council for innovative, Council Innov. Res. Peer Rev. Res. Pub. Syst. J. 9 (2013), no. 1.
[24] A. Schwarzenberg-Czerny, On matrix factorization and efficient least squares solution, Astron. Astrophys. Suppl. Ser. 110 (1995), no. 405, 110–405.