[1]
G. Al-Asad, M. Al-Husainy, M. Bani-Hani, A. Al-Zu’bi, S. Albatienh, and H. Abuoliem, “Comparative Assessment of Hash Functions in Securing Encrypted Images”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 6, pp. 18750–18755, Dec. 2024.