1. [1] Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, and J. Al-Azzeh, "Enhancing the Capacity of LSB Method by Introducing LSB2Z Method," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 76-90, Mar. 2019.
2. [2] Z. Alqadi, B. Zahran, Q. Jaber, B. Ayyoub, J. Al-Azzeh, and A. Sharadqh, "Proposed Implementation Method to Improve LSB Efficiency," International Journal of Computer Science and Mobile Computing, vol. 8, no. 3, pp. 306-319, Mar. 2019.
3. [3] Z. Alqadi, R. J. Rasras, M. R. A. Sara, and B. Zahran, "Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED)," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 6, pp. 3228-3235, Nov. 2019.
4. [4] A. Abu-Ein, A. Ziad, and J. Nader, "A Technique of Hiding Secrete Text in Wave File," International Journal of Computer Applications, vol. 151, no. 4, pp. 15-18, Oct. 2016.
5. [5] R. Abu Zneit, J. Al-Azzeh, Z. Alqadi, B. Ayyoub, and A. Sharadqh, "Using Color Image as a Stego-Media to Hide Short Secret Messages," International Journal of Computer Science & Mobile Computing, vol. 8, no. 6, pp. 106-123, Jun. 2019.