An implementation of steganography using construction of Huffman tree | IEEE Conference Publication | IEEE Xplore