搜索资源列表
Deconstructing_Interrupts.pdf
- THis paper deals with the application of interrupt generation entropy sourcing for hardware stenography implementaitons
JAK
- In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, we have plenty of security tools which are developed to protect the transmission of multimedia objects. But appr
STENOGRAPHY
- STENOGRAPHY data hidding in back side of image using des 32 bit algorithem