Akeel Awadh, Wid, Ali Salah Hashim, and Alaa Khalaf Hamoud. “A Review of Various Steganography Techniques in Cloud Computing”. University of Thi-Qar Journal of Science 7, no. 1 (June 20, 2019): 113–119. Accessed March 31, 2025. https://jsci.utq.edu.iq/index.php/main/article/view/261.