“ARM Based Application Of Data Hiding Process By Using Anti Forensics Technique For Authentication”. International Journal of Engineering and Computer Science, vol. 4, no. 07, July 2015, http://www.ijecs.in/index.php/ijecs/article/view/3293.