[1]
.-. -, فرهاد, عامرة, and عبد, “Hiding & Retrieval of Encrypted Data in an Image Using XOR Based on RBF and GRNN Networks and Comparison between their Performance”, IQJOSS, vol. 13, no. 2, pp. 35–50, Jun. 2025.