[1] A. Gutub, "Social Media & Its Impact on E-governance," The 4th Annual Middle East Smart Cities Summit (ME Smart Cities 2015), Dubai, UAE, December 2015.
[2] N. A. Al-Otaibi and A. A. Gutub, "2-Layer Security System for Hiding Sensitive Text Data on Personal Computers," Lecture Notes on Information Theory, vol. 2, no. 2, pp. 151-157, Engineering and Technology Publishing, June 2014.
[3] W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 2013.
[4] J. V. Shanta, "Evaluating the Performance of Symmetric Key Algorithms: AES and DES," International Journal of Computational Engineering & Management, vol. 15, no. 4, pp. 43-49, 2012.
[5] A. Nadeem, "A Performance Comparison of Data Encryption Algorithms," 1st International Conference on Information and Communication Technologies (ICICT), pp. 84-89, 2005.
[6] N. Alassaf, B. Alkazemi and A. Gutub, "Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems," Journal of Research in Engineering and Applied Sciences (JREAS), vol. 2, no. 2, pp. 50-58, April 2017.
[7] A. Gutub and F. A. Khan, "Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems," International Conf. on Advanced Computer Science Applications and Technologies (ACSAT), pp. 116-121, 2012.
[8] A. Gutub, "Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture Using Parallel Jacobian Coordinate System," International Journal of Computer Science and Security (IJCSS), vol. 4, no. 4, pp. 409-425, October 2010.
[9] A. Gutub, "Efficient Utilization of Scalable Multipliers in Parallel to Compute GF(p) Elliptic Curve Cryptographic Operations," Kuwait Journal of Science & Engineering (KJSE), vol. 34, no. 2, pp. 165-182, December 2007.
[10] A. A. Gutub, A. Tabakh, A. Al-Qahtani and A. Amin, "Serial vs. Parallel Elliptic Curve Crypto Processor Designs," IADIS International Conference: Applied Computing," pp. 67-74, Fort Worth, Texas, 23-25 October 2013.
[11] A. A. Gutub, "Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operations Using Multiple Parallel Multipliers," International Journal of Security (IJS), vol. 4, no. 4, pp. 46 – 63, 2010.
[12] A. A. Gutub, "Fast 160-Bits GF(p) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers," International Arab Journal of Information Technology (IAJIT), vol. 3, no. 4, October 2006.
[13] S. Channalli and A. Jadhav, "Steganography an Art of Hiding Data," International Journal of Computer Science and Engineering, vol. 3, pp. 137-141, 2009.
[14] F. Khan and A. A. Gutub, "Message Concealment Techniques Using Image-based Steganography," 4th IEEE GCC Conference and Exhibition, Gulf International Convention Centre, 2007.
[15] M. T. Parvez and A. A. Gutub, "Vibrant Color Image Steganography Using Channel Differences and Secret Data Distribution," Kuwait Journal of Science and Engineering (KJSE), vol. 38, no. 1B, pp. 127-142, June 2011.
[16] W. Abu-Marie, H. Abu-Mansour and A. A. Gutub , "Image-based Steganography Using Truth Table-based and Determinate Array on RGB Indicator," International Journal of Signal and Image Processing (IJSIP), vol. 1, no. 3, pp. 196-204, May 2010.
[17] N. A. Al-Otaibi and A. A. Gutub, "Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority," International Conf. on Advanced Engineering Technologies (AET-2014), pp. 250-256, 2014.
[18] A. A. Gutub, A. Al-Qahtani and A. Tabakh, "Triple-A: Secure RGB Image Steganography Based on Randomization," 7th ACS/IEEE International Conference on Computer Systems and Applications, pp. 400-403, 2009.
[19] S. Hemalatha, U. Dinesh Acharya and A. Renuka, "Comparison of Secure and High Capacity Color Image Steganography Techniques in RGB and YCbCr Domains," International Journal of Advanced Information Technology, vol. 3, no. 3, 2013.
[20] M. Kalita and T. Tuithung, "A Comparative Study of Steganography Algorithms of Spatial and Transform Domain," International Journal of Computer Applications, no. 1, pp. 9-14, 2016.
[21] N. Alotaibi, A. A. Gutub and E. Khan, "Stego-System for Hiding Text in Images of Personal Computers," The 12th Learning and Technology Conference (Wearable Tech/ Wearable Learning), Effat University, Jeddah, KSA, April 2015.
[22] A. A. Gutub, M. Ankeer, M. Abu-Ghalioun and A. K. Alvi, "Pixel Indicator High Capacity Technique for RGB Image-based Steganography," 5th IEEE International Workshop on Signal Processing and Its Applications, University of Sharjah, U.A.E., 18 – 20 March 2008.
[23] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S. W. Baik, "Image Steganography Using Uncorrelated Color Space and Its Application for Security of Visual Contents in Online Social Networks," ELSEVIER, Future Generation Computer Systems, 2016.
[24] N. Akhtar, P. Johri and S. Khan, "Enhancing the Security and Quality of LSB Based Image Steganography," 5th IEEE International Conference on Computational Intelligence and Computer Networks, pp. 385-390, September 2013.
[25] R. Kaur and B. Singh, "Survey and Analysis of Various Steganographic Techniques," International Journal of Engineering Science & Advanced Technology, vol. 2, no. 3, pp. 561-566, 2012.
[26] C. P. Sumathi1, T. Santanam and G. Umamaheswari, "A Study of Various Steganographic Techniques Used for Information Hiding," International Journal of Computer Science & Engineering Survey, vol. 4, no. 6, pp. 9-25, December 2013.
[27] S. M. Masud Karim, M. Saifur Rahman and M. Ismail Hossain, "A New Approach for LSB Based Image Steganography Using Secret Key," 14th IEEE International Conference on Computer and Information Technology, Dhaka, Bangladesh, 22-24 Dec. 2011.
[28] A. Gutub, "Pixel Indicator Technique for RGB Image Steganography," Journal of Emerging Technologies in Web Intelligence, vol. 2, no. 1, Feb. 2010.
[29] A. Singh and H. Singh, "An Improved LSB Based Steganography Technique for RGB Images," IEEE International Conference on Electrical, Computer and Communication Technologies, 5-7 March, Coimbatore, India, 2015.
[30] M. Juneja and P. S. Sandhu, "Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption," International Conference on Advances in Recent Technologies in Communication and Computing, pp. 302-305, 2009.
[31] K. Joshi and R. Yadav, "A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication," 3rd IEEE International Conference on Image Information Processing, pp. 86-90, 2015.
[32] Y. Rener, Z. Zhiwei, T. Shun and D. Shilei, "Image Steganography Combined with DES Encryption Pre-processing," 6th International Conference on Measuring Technology and Mechatronics Automation, pp. 323-326, Waknaghat, India, 21-24 Dec. 2014.
[33] S. Ushll, G. A. Sathish Kumal and K. Boopathybagan, "A Secure Triple Level Encryption Method Using Cryptography and Steganography," International Conference on Computer Science and Network Technology, pp.1017-1020, 2011.
[34] G. Sai Charan, N. Kumar, B. Karthikeyan, V. Yanathan and K. Lakshmi, "A Novel LSB Based Image Steganography with Multi-Level Encryption," International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 19-20 March 2015.
[35] S. Ahmed Laskar and K. Hemachandran, "High Capacity Data Hiding Using LSB Steganography and Encryption," International Journal of Database Management Systems, vol. 4, no. 6, pp. 57-62, 2012.
[36] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S. Wook Baik, "A Novel Magic LSB Substitution Method (M-LSB-SM) Using Multi-Level Encryption and Achromatic Component of an Image," Multimedia Tools and Applications, vol. 75, no. 22, pp. 14867-14893, Nov. 2016.
[37] J. N. Salameh, "A New Symmetric-Key Block Ciphering Algorithm," Middle-East Journal of Scientific Research, vol. 12, no. 5, pp. 662-673, 2012.
[38] J. N. Bani Salameh, "An Investigation of the Use of MJEA in Image Encryption," WSEAS Transactions on Computers, vol. 15, pp. 12-23, January 2016.
[39] K. Muhammad, J. Ahmad, N. Ur Rehman, Z. Jan and M. Sajjad, "CISSKA-LSB: Color Image Steganography Using Stego-key-directed Adaptive LSB Substitution Method," Springer US, Multimedia Tools and Applications, vol. 76, no. 6, pp. 8597–8626, April 2016.
[40] K. Muhammad, M. Sajjad and S. W. Baik, "Dual-Level Security Based Cyclic18 Steganographic Method and Its Application for Secure Transmission of Key Frames During Wireless Capsule Endoscopy," Springer US, Journal of Medical Systems, May 2016.