[1]
C. S. I. K., “Analysis of Various Techniques of Steganography for Embedding and Securing Data”, ijfrcsce, vol. 4, no. 2, pp. 96–99, Feb. 2018.