[1]
T. Davis, T. Manish, and M. Azath, “Survey on Data Hiding Techniques for Secure Image Transmission”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 141–144, Jan. 2015.