B Datta, U Mukherjee, SK Bandyopadhyay - Procedia Computer Science, 2016 - Elsevier
In the field of security different steganography techniques hides data within the cover media
in such a way so that human perception cannot follow it. All of these also try to follow three …