Figure 1From: Comparative study of digital audio steganography techniques Digital data security disciplines. Back to article page