1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB Indicator. International Journal of Signal and Image Processing 1:196–204
2. Al-Juaid N, Gutub A, Khan E (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research 1:8–18
3. Almazrooie M, Samsudin A, Gutub A, Salleh M, Omar M, Hassan S (2018) Integrity verification for digital holy Quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences.
https://doi.org/10.1016/j.jksuci.2018.02.006
4. Al-Otaibi N, Gutub A (2014a) 2-Leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2:151–157
5. Al-Otaibi N, Gutub A (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. Proceedings of 2014 International Conference on Advanced Engineering Technologies. pp 243–250