[1]
Monika, “Information Security Using Steganography: A Review”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 321–324, Nov. 2025.