[1]
“Implementation and comparative analysis of text steganography methods”, ICT, vol. 2, pp. 71–80, Nov. 2025, doi: 10.15276/ict.02.2025.10.