Return to Article Details Hiding & Retrieval of Encrypted Data in an Image Using XOR Based on RBF and GRNN Networks and Comparison between their Performance Download Download PDF