Search Results - (( evolution information encryption algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In encryption, sensitive information transforms into meaningless data with observable existence, while steganography embeds the secret information inside an object (i.e. image, video, text, and audio) with invisible existence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6