(1)
Akeel Awadh, W.; Salah Hashim, A.; Khalaf Hamoud, A. A Review of Various Steganography Techniques in Cloud Computing. UTJsci 2019, 7 (1), 113-119. https://doi.org/10.32792/utq/utjsci/v7i1.261.