[1]
A. E K, S. R, V. B, R. A, and N. M, “Improved Security of Hidden Data Based on Steganography Using ECC Method”, SHAREit, vol. 2, no. 2, pp. 5–11, Apr. 2022.