Techniques for data hiding | IBM Journals & Magazine | IEEE Xplore