[1] Bhardwaj A., Subrahmanyam G., Avasthi V., and Sastry H.:Security algorithms for cloud computing. In: International Conference on Computational Modelling and Security, Elsevier, India, 2016(85), 535-542. DOI:10.1016/j.procs.2016.05.215.
[2] Bairagi K., Khondoker R., and Islam R.: An efficient steganographic approach for protecting communication in critical infrastructures of the Internet of Things (IoT). Information Security Journal: Global Perspective, 2016(25), 197–212. DOI: 10.1080/19393555.2016.1206640.
[3] Muniraj M., Qureshi A., and Bharathi N.: Geo-tagged Internet of Things (IoT) device for Radiation Monitoring. In: International Conference on Advances in Computing, Communications and Informatics, IEEE, India, 2017(2017), 431-436. DOI:10.1109/ICACCI.2017.8125878.
[4] ELhoseny M., Ramirez-Gonzalez G., Abu-ELnasr O., Shawkat S., Arunkumar N., and Farouk A.:Secure medical data transmission model for IoT-based healthcare systems.Proc IEEE, 2018(6), 20596 – 20608, 2018.DOI: 10.1109/ACCESS.2018.2817615.
[5] Hu J., Chen C., Fan C., and Wang K.: An intelligent and secure health monitoring scheme using IoT sensor based on cloud computing. Journal of Sensors, Hindawi, 2017(2017), 1–11. DOI: 10.1155/2017/3734764.
[6] Kim S., Lim H., Lim S., and Shin I.: Study on cyber security assessment for wireless network at nuclear facilities. In: 6th International Symposium on Digital Forensic and Security, IEEE, Turkey, 2018. DOI:10.1109/ISDFS.2018.8355332.
[7] Talbi M.: Speech Signal Embedding into Digital Images Using Encryption and Watermarking Techniques.Springer, 2020, 1–11. DOI:10.1109/ICCEA.2004.1459412.
[8] Xu Z., Liu W., Huang J., Yang C., Lu J., and Tan H.: Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. Security and Communication Networks Journal, Hindawi, 2020 (2020), 1-13. doi.org/10.1155/2020/8872586
[9] Abdullahi M., Baashar Y., Alhussian H., Alwadain A., Aziz N., Capretz L. F., and Abdulkadir S.: Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics Journal, MDPI, 11(198), 1-27, 2022.
[10] Kotenko I., Izrailov K., and Buinevich M.: Static Analysis of Information Systems for IoT Cyber Security:
A Survey of Machine Learning Approaches. Sensors Journal, MDPI, 22(1335), 2022.
[11] Lee J., Jeong K., Kim J., and Im C.: The development of remote wireless radiation dose monitoring system. In: 4th International Conference on Advancements in Nuclear Instrumentation Measurement Methods and their Applications, IEEE, Portugal, 2016. DOI:10.1109/ANIMMA.2015.7465285.
[12] Gaber M., Mahmoud I., Seddik O., and Zekry A.: Development of Routing protocols in Wireless Sensor Networks for Monitoring Applications. Faculty of Engineering, Ain-Shams University, Master Thesis, 2016.
[13] Hajjaji Y., Boulila W., Farah I., Romdhani I., and Hussain A.: Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, 1-17, 2021. https://doi.org/10.1016/j.cosrev.2020.100318
[14] https://sightengine.com, accessed in Jan, 2020
[15] Jhanjhi N., Humayun M., and Almuayqil S.: Cyber Security and Privacy Issues in Industrial Internet of Things. Computer Systems Science & Engineering Journal, Tech Science Press, 1-20, 2021.DOI:10.32604/csse.2021.015206
[16] Gupta H. and Varshney G.: A Security Framework for IOT Devices against Wireless Threats. In: 2nd International Conference on Telecommunication and Networks (TEL-NET 2017), 2017. DOI:10.1109/TEL-NET.2017.8343548.
[17] Mousavi S., Ghafari A., Besharat S., and Afshari H.: Improving the security of internet of things using cryptographic algorithms: a case of smart irrigation systems. Journal of Ambient Intelligence and Humanized Computing, 2021(12), 2033–2051, 2021. https://doi.org/10.1007/s12652-020-02303-5
[18] Savitha V., Karthikeyan N., Karthik S., and Sabitha R.: A distributed key authentication and OKM‑ANFIS scheme based breast cancer prediction system in the IoT environment. Journal of Ambient Intelligence and Humanized Computing, 2021(12), 1757–1769, 2021. https://doi.org/10.1007/s12652-020-02249-8
[19] Rabiah A., Ramakrishnan K., Liri E., and Kar K.: A lightweight authentication and key exchange protocol for IoT.In:Workshop on Decentralized IoT Security and Standards, USA, 2018. DOI: 10.14722/diss.2018.23004.
[20] Devi M. and Sharma N.: Improved detection of least significant bit steganography algorithms in color and gray scale images. Proceedings of RAECS UIET, IEEE, Panjab University Chandigarh, 2014. DOI:10.1109/RAECS.2014.6799507.
[21] Saleh M., Aly A., and Omara F.: Data security using cryptography and steganography techniques. International Journal of Advanced Computer Science and Applications, 2016(7), 390-397. DOI:10.14569/IJACSA.2016.070651.
[22] Ansari A., Mohammadi M., and Parvez M.: A comparative study of recent steganography techniques for multiple image formats.International Journal of Computer Network and Information Security, 2019(11), 1-11. DOI:10.5815/ijcnis.2019.01.02.
[23] Usman M., Ahmed I., Aslam M., Khan S., and Shah U.: SIT: A lightweight encryption Algorithm for Secure Internet of Things. International Journal of Advanced Computer Science and Applications, 2018(8), 1–10. Doi:10.14569/IJACSA.2017.080151.
[24] Duraisamy S., Krishnasamy P., Jacaob J., and Duraisamy J.: Enhancement of Security and QoS in Wireless Medical Sensor Networks Journal of Computer Science and Engineering, 14(2), 66-75, 2020. http://dx.doi.org/10.5626/JCSE.2020.14.2.66
[25] Hussain R. and Abdullah I.: Review of different encryption and decryption Techniques used for security and privacy of IoT in different applications.In: 6th International Conference on Smart Energy Grid Engineering, IEEE Access, Canada, 2018, 293 – 297. DOI:10.1109/SEGE.2018.8499430.
[26] Kalra S. and Sood S.: Secure authentication scheme for IoT and cloud servers. Journal of Pervasive and Mobile Computing, Elsevier, 2015(24), 210-223.
[27] Kim J., Shim M., Hong S., Shin Y. and Choi E.: Intelligent Detection of IoT Botnets Using Machine
Learning and Deep Learning, Applied Sciences, MDPI, 10 (7009), 1-22, 2020. Doi:10.3390/app10197009 2020
[28] Qiu L., Liu Z., Pereira G., and Seo H.: Implementing RSA for sensor nodes in smart cities. Personal and Ubiquitous Computing Journal, Springer, 2017(21), 807–813, 2017. DOI: 10.1007/s00779-017-1044-y.
[29] Ullo S. and Sinha G.: Advances in Smart Environment Monitoring Systems Using IoT and Sensors. Sensors Journal, MDPI, 20(3113), 1-18, 2020. doi:10.3390/s20113113
[30] Sadikin F., Deursen T., and Kumar S.: A Hybrid Zigbee IoT intrusion detection system using secure and efficient data collection, Internet of Things Journal, 2020(12), 1-18, 2020. https://doi.org/10.1016/j.iot.2020.100306
[31] Wang C., Shen J., Liu Q., Ren Y., and Li T.: A novel security Scheme based on instant encrypted transmission for Internet of Things. Journal of Security and Communication Networks, Hindawi, 2018. DOI:10.1155/2018/3680851.
[32] Jiao S. and Liu R.: A survey on physical authentication methods for smart objects in IoT ecosystem. Internet of Things Journal, 2019(6). DOI: 10.3390/s19051141.
[33] Kponyo J., Agyemang J., Klogo G., and Boateng J.: Lightweight and host-based denial of service (DoS) detection and defense mechanism for resource-constrained IoT devices, Internet of Things Journal, 12, 2020. https://doi.org/10.1016/j.iot.2020.100319
[34] Sharma P. and Rajni: Analysis of Image Watermarking Using Least Significant Bit Algorithm. International Journal of Information Sciences and Techniques, 2012(2), 95-101, 2012. DOI:10.5121/ijist.2012.1409.
[35] Loukhaoukha K., Chouinard J., and Berdai A.: A secure image encryption algorithm based on Rubik's cube principle.Journal of Electrical and Computer Engineering, Hindawi, 2012(2012), 1–13. DOI:10.1155/2012/173931.