ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Industrial engineer
Pure sciences
Architecture and Urbanism
Research
Biology
Electrical and electronic
Mathematics
all records (28)

Languages
English

Countries
Indonesia
USA
Iraq
India
Ukraine
Bosnia Herzegovina
Romania
Colombia
Turkey, Turkish Republic
Canada
all records (21)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (13)

Filter  
 
179  Articles
1 of 19 pages  |  10  records  |  more records»
Bit-Plane Complexity Segmentation (BPCS) is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes cont... see more

Security in communication is very important for everyone to pay attention to. To prevent data leakage and illegal retrieval of data, cryptography and steganography can be used. In this study, GOST and XOR LSB with PRNG were used to inject text into images... see more

Due to the rapid development and rapid popularization of the information technology, internet and digital media have become an important tool for military, commercial, individuals and many other organizations to obtain and transmit information. However, d... see more

Copyright is a direct right granted to the creator of a work in any form that is real and recognized in accordance with the provisions of the legislation in force in the area. Copyright infringement is very detrimental to the creators of works who have tr... see more

Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic crypt... see more

This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the bac... see more

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sens... see more

Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modificati... see more

1 of 19 pages  |  10  records  |  more records»