[1]
“A Review of Various Steganography Techniques in Cloud Computing”, UTJsci, vol. 7, no. 1, pp. 113–119, Jun. 2019, doi: 10.32792/utq/utjsci/v7i1.261.