[1]
Jayaraman, Esakkirajan And Veerakumar, Digital Image Processing, Tata Mcgraw Hill.
Google Scholar
[2]
www. researchgate. net/.. Color_image.. /60b7d52b09895a746f. pdf.
Google Scholar
[3]
William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Pearson Education.
Google Scholar
[4]
Bruce Schneier, Applied Cryptography, John Wiley & Sons (Asia) Pte Ltd, Isbn 9971-51-348-X.
Google Scholar
[5]
Ashish Agarwal, Simon Fraser University, Encrypting Messages Using The Merkle-Hellman Knapsack Cryptosystem, Ijcsns Vol, 11 No. 5, May (2011).
Google Scholar
[6]
Merkle, Ralph And Martin Hellman, Hiding Information And Signatures In Trapdoor Knapsacks, " Information Theory, Ieee Transactions On, Vol. 24, No. 5, Pp. 525-530, Sep 1978 Url: Http: /Ieeexplore. Ieee. Org/Search/Freesrchabstract. Jsp, Tp=&Arnu mber=1055927.
DOI: 10.1109/tit.1978.1055927
Google Scholar
[7]
Shamir, Adi, A Polynomial-Time Algorithm For Breaking The Basic Merkle - Hellman Cryptosystem, " Information Theory, Ieee Transactions On, Vol. 30, No. 5, Pp. 699-704, Sep 1984 Url: Http: /Ieeexplore. Ieee. Org/Search/Freesrchabstract. Jsp, Tp=&Arnu mber=4568386.
DOI: 10.1109/tit.1984.1056964
Google Scholar
[8]
crypto. stanford. edu/~dabo/papers/RSA-survey. pdf.
Google Scholar
[9]
www. members. tripod. com/irish_ronan/rsa/attacks. html.
Google Scholar
[10]
Behrouz A. Forouzan, Cryptography and Network Security, Tata Mcgraw Hill.
Google Scholar
[11]
Goldberg D.E., Genetic algorithms in search optimization & Machine learning, Addison- Wesley, (1989).
Google Scholar
[12]
www. merriampark. com\lcm. htm.
Google Scholar
[13]
G. Lokeshwari, G. Aparna, Dr S. Udaya kumar, A Novel Scheme For Image Encryption Using Merkle-Hellman Knapsack Cryptosystem – Approach, Evaluation And Experimentation, International Journal of Computer Science And Technology (IJCST) Volume 2, Issue 4, Oct – December 2011 Pp. 344-348.
Google Scholar
[14]
G. Lokeshwari, Dr S. Udaya kumar, G. Aparna Reliable Block based Cryptosystem: Combination of Merkle-Hellman and RSA for secured image Transmission, Computing and Convergence Technology (ICCCT), 2012 7th International Conference on 3-5 Dec. 2012 , Pp 626 – 630, Seoul, Korea, Print ISBN: 978-1-4673-0894-6.
Google Scholar
[15]
Pranam Paul, Saurabh Dutta, A K Bhattacharjee, Enhancement of Security Through An Efficient Substitution- Based Block Cipher Of Bit-Level Implementation With Possible Lossless Compression, Vol. 8 No. 4 Pp. 318-326.
Google Scholar
[16]
Gove Nitinkumar Rajendra, Bedi Rajneesh kaur A New Approach for Data Encryption using Genetic Algorithms and Brain Mu Waves , International Journal Of Scientific And Engineering Research Volume 2, Issue 5, May-2011 ISSN 2229-5518.
Google Scholar