[1]
O. Abed Najm, عمر, A. Sami Nori, and أحمد, “Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey”, RJCSM, vol. 18, no. 1, pp. 125–130, Jun. 2025.