[1]
H. . Alauldeen Al-Bayati, L. . M. Jawad, and D. . N. Hamod, “Exploring Visual Cryptography Techniques: A Comprehensive Review”, Al-Nahrain J. Sci., vol. 27, no. 3, pp. 97–108, Sep. 2024, doi: 10.22401/d8y2v967.