[1]
S. Tomar and P. Singh, “Review: Privacy Preserving and Sensitive Data Hiding Methods”, JARCSE, vol. 2, no. 1, pp. 12–19, Jan. 2015, doi: 10.53555/nncse.v2i1.511.