[1] Mahmood K.,Ibrahem K. .2017 .Implementation of VoIP Speech Encryption System Using Stream Cipher with Lorenz map Key Generator. International Journal of Scientific & Engineering Research, 8(7) : .
[2] M. M. R. A. G. P. G. Alvarez F. .2000 .Cryptanalysis of a chaotic encryption system. Physics Letters, 276(1) : 1-13.
[3] Hato A. D. S. Eman .2015 .Lorenz and Rossler Chaotic System for Speech Signal Encryption. International Journal of Computer Applications, 128(11) : 25-33.
[4] Abu-Faraj M.,Al-Hyari A.,Aldebei K.,Al-Ahmad B.,Alqadi Z. .2022 .Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography. IEEE Access, 3187317 : 69388-69397.
[5] Abu-Faraj M.,Al-Hyari A.,I. A.,Alqadi Z.,Abu-Faraj M.,Al-Hyari A.,Alqadi Z. .2022 .CASDC: A Cryptographically Secure Data System Based on Two Private Key Images. IEEE Access, 32263 : 126304-126314.
[6] .2022 .Experimental Analysis of Methods Used to Solve Linear Regression Models. Materials & Continua, 027364(3) : 5699-5712.
[7] Abu-Faraj M.,Al-Hyari A.,Alqadi Z. .2022 .Complex Matrix Private Key to Enhance the Security Level of Image Cryptography. , 14(4) : 664-678.
[8] Abu-Faraj M.,Aldebei K.,Alqadi Z. .2022 .. Highly Secure, and Multiple Purposed Method on Data Cryptography. Traitement du Signal, 39(1) : 173-178.
[9] Abu-Faraj M.,Zubi M. .2020 .Analysis and Implementation of Kidney Stones Detection by Applying Segmentation Techniques on Computerized Tomography Scans. Italian Journal of Pure and Applied Mathematics, 43 : 590-602.
[10] Abu-Faraj M.,Alqadi Z.,Zubi M. .2022 .Creating Color Image Features Based on Morphology Image Processing. Traitement du Signal, 39(3) : 797-803.
[11] Abu-Faraj M.,Alqadi Z.,Al-Ahmad B.,Aldebei K.,Ali B. .2022 .A Novel Approach to Extract Color Image Features using Image Thinning. Applied Mathematics & Information Sciences (AMIS), 16(5) : 665-672.
[12] Abu-Faraj M.,Al-Hyari A.,Al-Ahmad B.,Alqadi Z.,Ali B.,Alhaj A. .2022 .Building a Secure Image Cryptography System using Parallel Processing and Complicated Dynamic Length Private Key. Applied Mathematics & Information Sciences (AMIS), 16(6) : 1017-1026.
[13] Abu-Faraj M.,Al-Hyari A.,Alqadi Z.,Ali B. .2023 .Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography. International Journal of Data and Network Science, 1(1) : 1-12.
[14] Abu-Faraj M.,Al-Hyari A.,Al-Ahmad B.,Alqadi Z.,Ali B.,Aldebe K. .2023 .Improving the Efficiency of Median Filters Using Two Rounds of Generated Windows Processing. Applied Mathematics & Information Sciences (AMIS), 17(1) : 187-200.
[15] Prof .2023 .Digital Image Cryptography using Index Keys. International Journal of Computer Science and Mobile Computing, 12(2) : 26-37.
[16] Hatim Zaini,Alqadi Ziad .2023 .Long Messages Segmentation for Efficient Message Cryptography. , 12(1) : 59-69.
[17] Ziad A.,Alqadi A. .2023 .Improving Data Standard Methods of Cryptography. ARPN Journal of Engineering and Applied Sciences, 17(24) : 2077-2088.
[18] Abdullah N.,Olimat Ali F.,Al-Shawabkeh Ali F.,Al-Qadi Ali F.,Al-Najdawi Ali F. .2023 .Experimental study and computational approach prediction on thermal performance of eutectic salt inside a latent heat storage prototype. Thermal Science and Engineering Progress, 37 : 101606.
[19] Alqadi Z. A.,Ibrahiem M. M. El Emary Z. A. .2008 .Performance analysis and evaluation of parallel matrix multiplication algorithms. World Applied Sciences Journal. 5, (2) : 211-214.
[20] Al-Rawashdeh Ayman .2018 .Using wave equation to extract digital signal features. , 8(4) : 1356-1359.
[21] Ziad Alqadi .2019 .Enhancing the Capacity of LSB Method by Introducing LSB2Z Method. International Journal of Computer Science and Mobile Computing, 8(3) : 76-90.
[22] Ziad A.,Alqadi A.,Al-Dwairi A. .2010 .Optimized TrueRGB color Image Processing. World Applied Sciences Journal, 4952(10) : 1175-1182.
[23] Waheeb A.,Ziad AlQadi A. .2009 .Gray image reconstruction. Eur. J. Sci. Res, 27 : 167-173.
[24] Moustafa A. A.,Image Reconstruction Using a New R'G'I Model Z. A. Alqadi. 2009. Color . .. Journal of Computer Science, 5(4) : 250-254.
[25] Matrouk K.,Al-Hasanat A.,Alasha'ary H.,Al-Qadi Al-Shalabi Z. .2014 .Speech fingerprint to identify isolated word person. World Applied Sciences Journal, 31(10) : 1767-1771.
[26] Al-Azzeh J.,Zahran B.,Alqadi Z.,Ayyoub B.,Abu-Zaher M. .2018 .A Novel zero-error method to create a secret tag for an image. Journal of Theoretical and Applied Information Technology, 96(13) : 4081-4091.
[27] Prof. Ziad A. A. Alqadi ,Prof. Mohammed K. Abu Zalata ,Ghazi M.,Qaryouti M. .2016 .Comparative Analysis of Color Image Steganography. JCSMC, 5(11) : 37-43.
[28] Bilal Zahran .2016 .A Comparison between Parallel and Segmentation Methods Used For Image EncryptionDecryption. International Journal of Computer Science & Information Technology (IJCSIT), 8(5) : .
[29] Alqadi Z. A.,Abu-Jazar A. .2005 .Analysis of Program Methods Used for Optimizing Matrix Multiplication. Journal of Engineering, 15(1) : 73-78.
[30] . .. International Journal of Computer Science and Mobile Computing, 8(3) : 14-26.
[31] Al-Azzeh Jamil,Mesleh Muhammed .2019 .A Novel Based on Image Blocking Method to Encrypt-Decrypt Color. International Journal on Informatics Visualization, 3 : .
[32] Zahran B.,AL-Azzeh J.,Qadi Z. Al,Zoghoul M. Al,Khawatreh S. .2018 .A Modified Lbp Method to Extract Features from Color Images. Journal of Theoretical and Applied Information Technology (JATIT), 96(10) : .
[33] Al-Azzeh J.,Zahran B.,Alqadi Z.,Ayyoub B.,Abu-Zaher M. .2018 .A novel Zero-error Method to Create a Secret Tag for an Image. Journal of Theoretical and Applied Information Technology (JATIT), 96(13) : 4081-4091.
[34] Al-Azzeh J.,Zahran B.,Alqadi Z. .2018 .Salt and Pepper Noise: Effects and Removal. International Journal on Informatics Visualization, 2(4) : 252-256.
[35] Jihad Nader,Zahran Bilal .2017 .Analysis of Color Image Filtering Methods. International Journal of Computer Applications (IJCA), 174(8) : 12-17.
[36] Ziad Alqadi,Nader Jihad .2017 .Estimation and Tuning of FIR Low pass Digital Filter Parameters. International Journal of Advanced Research in Computer Science and Software Engineering, 7(2) : 18-23.
[37] Dr .2022 .Highly Secure Method for Secret Data Transmission. International Journal of Scientific Engineering and Science, 6(1) : 49-55.
[38] Musbah J.,Aqel J. .2018 .RGB color image encryptiondecryption using image segmentation and matrix multiplication. International Journal of Engineering & Technology. 7, (3) : 104-107.