[1]
F. A. . Azzo, A. T. . Suhail, H. G. . Ayoub, and Z. A. Abdulrazzaq, “Hybrid software-hardware image encryption techniques for network security using multiple chaotic maps”, ijirss, vol. 8, no. 5, pp. 2140–2150, Aug. 2025.