Review Article

Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions

Figure 2

Common information hiding techniques.