Al-Asad, Ghayth, Mohammed Al-Husainy, Mohammad Bani-Hani, Ala’eddin Al-Zu’bi, Sara Albatienh, and Hazem Abuoliem. “Comparative Assessment of Hash Functions in Securing Encrypted Images”. Engineering, Technology & Applied Science Research 14, no. 6 (December 2, 2024): 18750–18755. Accessed January 21, 2025. https://etasr.com/index.php/ETASR/article/view/8961.