https://1library.org/document/qvllwlly-securing-cover-limitation-hidden-using-computation-cryptography-steganography.html