Application steganography methods of replacement and insertion technique | IEEE Conference Publication | IEEE Xplore