1.
E K A, R S, B V, A R, M N. Improved Security of Hidden Data Based on Steganography Using ECC Method. SHAREit [Internet]. 2022 Apr. 6 [cited 2024 Apr. 24];2(2):5-11. Available from: https://shareit.joinjet.org/ojs/index.php/shareit/article/view/29