1.
D. Purushothaman and S. Abburu, “An Approach for Data Storage Security in Cloud Computing”, IJCSI International Journal of Computer Science Issues, 2012, 9(2.1), pp. 100-105.
2.
P.B. Godhankar and D. Gupta “Review of Cloud Storage Security and Cloud Computing Challenges”, (IJCSIT) International Journal of Computer Science and Information Technologies, 2014, 5(1), pp. 528-533.
3.
J. Puranik and A. Giri, “Security in Data Storage in Cloud Computing”, International Research Journal of Engineering and Technology (IRJET), 2016, 3(6), pp. 1899-1902.
4.
N. Vurukonda and B.T. Rao, “A Study on Data Storage Security Issues in Cloud Computing”, In 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Procedia Computer Science, 2016, 92, pp. 128-135.
5.
R. Wang, “Research on data security technology based on cloud storage”, In 13th Global Congress on Manufacturing and Management, GCMM 2016, Procedia Engineering 2017, 174, pp. 1340-1355.
6.
A. Srivastava. (), “A survey report on Different Techniques of Image Encryption”, International Journal of Emerging Technology and Advanced Engineering, 2012, 2(6), pp. 163-167.
7.
R. Kaur and K. Singh, “Image Encryption Techniques: A Selected Review”, IOSR Journal of Computer Engineering (IOSR-JCE), 2013, 9(6), pp. 80-83.
8.
M. Kumar, A. Aggarwal and A. Garg, “A Review on Various Digital Image Encryption Techniques and Security Criteria”, International Journal of Computer Applications, 2014, 96(13), pp. 19-26.
9.
H. Pan, Y. Lei and C. Jian, “Research on digital image encryption algorithm based on double logistic chaotic map”, EURASIP - Journal on Image and Video Processing, 2018, (142), pp. 1-10.
10.
K. Mishra, R. Saharan. and B. Rathor , “A New Cryptographic Method for Image Encryption”, Journal of Intelligent and Fuzzy Systems, 2017, pp. 1-9.
11.
N.M. Almutairy, and K.H.A. Al-Shqeerat, “A Survey On Security Challenges Of Virtualization Technology In Cloud Computing”, International Journal of Computer Science & Information Technology (IJCSIT), 2019, vol. 11(3), pp. 95-105.
12.
A. Ghani, A. Badshah, S. Jan. et al., “Issues and challenges in Cloud Storage Architecture: A Survey”, Researchpedia Journal of Computing, 2020, 1(1.6), pp. 50-65.
13.
N.R. Tadapaneni, “Cloud Computing Security Challenges”, International Journal Of Innovations In Engineering Research And Technology [IJIERT], 2020, 7(6), pp. 1-5.
14.
A. Aliyu, A.H. Abdullah, O. Kaiwartya, et al., “Mobile Cloud Computing: Taxonomy and Challenges – A Review Article”, Hindawi-Journal of Computer Networks and Communications, 2020,, pp. 1-23.
15.
J. Mahalakshmi and K. Kuppusamy. “An efficient Image Encryption Method based on Improved Cipher Block Chaining in Cloud Computing as a Security Service”, Australian Journal of Basic and Applied Sciences, 2016, 10(2s), pp. 297-306.
16.
M. Sankari, and P. Ranjana, “Privacy-Preserving Lightweight Image Encryption in Mobile Cloud”, In N. R. Shetty et al. (eds.), Emerging Research in Computing, Information, Communication and Applications, Advances in Intelligent Systems and Computing 2019, (882), pp. 404-415.
17.
S. Ayyub, and P. Kaushik, “Secure Searchable Image Encryption in Cloud Using Hyper Chaos”, The International Arab Journal of Information Technology, 2019, 16(2), pp. 251-259.
18.
P.V. Lahande and P.R. Kaveri, “Increasing Data Secrecy In Cloud By Implementing Image Cryptography”, International Journal Of Scientific & Technology Research, 2020, 9(4), pp. 26-31.
19.
A. Altowaijri, M. Ayari and Y.E. Touati. “A Novel Image Encryption Approach for Cloud Computing Applications”, (IJACSA) International Journal of Advanced Computer Science and Applications, 2018, 9(12), pp. 440-445.
20.
K. Handa. and U. Singh., “Data Security in Cloud Computing using Encryption and Steganography”, International Journal of Computer Science and Mobile Computing, 2015, 4(5), pp. 786-791.
21.
I.N. Ibraheem, S.M. Hassan and S.A. Abead, “Comparative Analysis & Implementation Of Image Encryption & Decryption For Mobile Cloud Security”, International Journal of Advanced Science and Technology, 2020, 29(3s), pp. 109-121.
22.
I.A. Awan, M. Shiraz, M.U. Hashmi, et al., “Secure Framework Enhancing AES Algorithm in Cloud Computing”, Hindawi-Journal of Security and Communications Networks,2020, pp. 1-16.
23.
V. Bornare, K. Nikam, D. Khedkar and S. Hole, “Data Sharing with Sensitive Information Hiding for Secure Cloud Storage”, IJSRD - International Journal for Scientific Research & Development, 2020, 8(3), pp. 139-141.
24.
P.K. Chandaliya, V. Kumar, M. Harjani, et al., “SCDAE: Ethnicity and Gender Alteration on CLF and UTKFace Dataset”, Computer Vision and Image Processing, Springer Eds-Singapore, 2020, pp. 294-306.
25.
D. Datta, D. Mittal, N.P. Mathew and J. Sairabanu., “Comparison of performance of parallel computation of CPU cores on CNN model”, In Proc. 2020 Int. Conf. on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, Piscataway: IEEE, 2020, pp. 1-8.
26.
K. Nantomah. “On Some Properties of the Sigmoid Function”, Asia Mathematika, 2019, 3(1),pp. 79-90.
27.
A.F.M. Agarap, “Deep Learning using Rectified Linear Units (ReLU)”, 2019, Retrieved on 26th February 2021 from https://arxiv.org/pdf/1803.08375.pdf.