[1]
Bhowmick, A. et al. 2015. Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography. International Journal of Computer Sciences and Engineering. 3, 3 (Mar. 2015), 7–12.