Return to Article Details Security in Ad-hoc Network Using Encrypted Data Transmission and Steganography Download Download PDF