[1]
O. M. Ahmed and W. M. Abduallah, “A Review on Recent Steganography Techniques in Cloud Computing”, ACAD J NAWROZ UNIV, vol. 6, no. 3, pp. 106–111, Aug. 2017.