[1]
A. Tale, M. Gunjal, and B. Ahire, “Data Leakage Detection Using Information Hiding Techniques”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 155–158, Mar. 2014.