[1] M. Abdel hameed, M. Hasaballah, S. Aly and A. I. Awad, An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques, J. IEEE Access 7 (2019) 185189 − 185204.
[2] M. Abdur Razzaq, M. A. Baig, R. A. Shaikh and A. A. Memon, Digital image security: fusion of encryption, steganography and watermarking, J. Adv. Comput. Sci. Appl. 8 (5) (2017) 224 − 228.
[3] A. S. Ansari, M. S. Mohammadi and M. T. Parvez, A comparative study of recent steganography techniques for multiple image formats, IJCNIS 1 (2019) 11 − 25.
[4] Y. P. Astuti, D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, Simple and secure image steganography using LSB and triple XOR operation on MSB, In: Int. Conf. Info. Commun. Tech. (ICOIACT), Yogyakarta, Indonesia (2018) 191 − 195.
[5] G. Azizi (in Persian), Electronic Document Management, Organization of Documents and National Library, I. R. Iran, 2011.
[6] N. Beagrie, Digital curation for science, digital libraries, and individuals, Int. J. Digit. Curation
1 (1) (2006) 3 − 16.
[7] D. P. Best, The future of information management, Records Manag. J. (2010) 61 − 71.
[8] H. Bhattacharjee and S. K. Bandyopadhyay, Frequency domain approach of image steganography, Int. J. Innovative Res. Info. Sec.
3 (2) (2016) 9 − 16.
[9] S. S. N. Bhuiyan, N. Abdul Malek, O. O. Khalifa and F. D. Abdul Rahman, An improved image steganography algorithm based on PVD, Indones. J. Electr. Eng. Comput. Sci.
10 (2) (2018) 569 − 577.
[10] K. Chang, C. Chang, P. S. Huang and T. Tu, A novel image steganographic method using Tri-way pixel-value differencing, J. Multimedia
3 (2) (2008) 37 − 44.
[11] S. Delenda and L. Noui, A new steganography algorithm using polar decomposition, Inf. Secur. J.: A Global Perspective
27 (3) (2018) 133 − 134.
[12] Gartner inc, [Online]. Available:
https://www.gartner.com/en/information-technology/glossary/im-information-management, Accessed 20 jan (2020).
[13] T. Haryanto, A. Pratama, H. Suhartanto, A. Murni, K. Kusmardi and J. Pidanic, Multipatch-GLCM for texture feature extraction on classification of the colon histopathology images using deep neural network with GPU acceleration, J. Comput. Sci.
16 (3) (2020) 280 − 294.
[14] M. Hussain, A. W. AbdulWahab, A. T. S. Ho, N. Javed and J. Ki-Hyun, A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement, Signal Processing: Image Commun.
50 (2017) 44 − 57.
[15] Z. Li and Y. He, Steganography with pixel value differencing and modulus function based on PSO, J. Info. Secur. Appl.
43 (2018) 48 − 49.
[16] A. S. Lorente and S. Berres, A secure steganographic algorithm based on frequency domain for the transmission of hidden information, Secur. Commun. Networks
2017 (2017) 5397082.
[17] J. D. F. Miñon, C. M. A. Lim, J. A. L. Morano, R. F. Fajutagana and B. S. Fabito, An intranet-based document management and monitoring system framework: A case for the National University Quality Management Office, 2016 IEEE Region 10 Conf. (TENCON) (2016) 2262 − 2267.
[18] ODLIS, [Online]. Available:
https://www.abc-clio.com/ODLIS/odlis-d.aspx, Accessed 20 jan (2020).
[19] L. Robert and T. Shanmugapriya, A study on digital watermarking techniques Int. J. Recent Trends Eng.
1 (2) (2009) 223 − 225.
[20] D. S. H. Rosenthal, T. Robertson, T. Lipkis and V. Reich, Requirements for digital preservation systems: a bottomup approach, D-Lib Magazine
11 (11) (2005). Available:
http://www.dlib.org/dlib/november05/rosenthal/11rosenthal.html[21] A. Shaik and R. Amitharajan, Data security through data hiding in images: a review, J. Artif. Intell.
10 (1) (2017) 1 − 21.
[22] R. H. Sprague, Electronic document management: challenges and opportunities for information systems managers, MIS Quarterly
19 (1) (1995 ) 29−49.
[23] W. Stallings, Cryptography and Network Security Principles and Practice, 5th ed., Prentice Hall, New York, 2011.
[24] G. Singh, Supria: A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, Int. J. Comput. Appl.
67 (19) (2013) 33 − 38.
[25] B. Thamaraichelvi and G. Yamuna, Gray Level Co-Occurrence Matrix features based classification of tumor in medical images, ARPN J. Eng. Appl. Sci.
11 (19) (2016) 11403 − 11414.
[26] J. Valkonen, Document Management for SmallMusiness, Master’s Thesis, Turku University of Applied Sciences, 2015.
[27] B. Zarrinkelki (in Persian), Government organisations and electronic documents, Treasures of Documents
20 (2) (78) (2011) 100 − 120.