Steganography and new implementation of steganography | IEEE Conference Publication | IEEE Xplore