Return to Article Details Recursive Equation Approach of Information Hiding for Authentication of Digital Data Download Download PDF