International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Found about 340 results

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 50 - 52

Comparison of MAC and Digital Signature

G. Pranitha

Share this article

Informative Article, Management, India, Volume 8 Issue 1, January 2019

Pages: 606 - 608

Blockchain Technology has the Ability to Change the Face of New Business

Dr. Ravikumar, Omprathap Velu

Share this article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this article

Research Paper, Computer Science, Iraq, Volume 9 Issue 3, March 2020

Pages: 286 - 291

DNA-Chaos S-Box Generation for Modified Lightweight AES Algorithm for Data Packet Protection in MANET

Muntaha A. Hatem, Haider K. Hoomod

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 1, January 2016

Pages: 8 - 12

A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images

Bhagyashri P. Kandalkar, G. D. Dalavi

Share this article

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 631 - 634

End-End Authentication and Cryptography based on Mobile Number and Mac Address

S Shunmuga Sundaram

Share this article

Research Paper, Business Management, India, Volume 7 Issue 4, April 2018

Pages: 367 - 370

Recent Trend in Crypto Currency in India Vs Global: Issues and Challenges-Overview

Dr. K. Kamalakkannan

Share this article

Research Paper, Information Technology, India, Volume 8 Issue 3, March 2019

Pages: 514 - 520

Secure Conversation and Images Using End-to-End Encryption on Android in WhatsApp

Amritha R, Anu Priya R, Initha G, Sindhu Priya S

Share this article

Informative Article, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 341 - 343

Block Chain for Securing Internet of Things

Astha Kumari, Sayed Sohail, Ritwik Giri

Share this article

Research Paper, Information Technology, India, Volume 8 Issue 8, August 2019

Pages: 703 - 705

Bitcoin and its Real Time Applications

Rishika Malli

Share this article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 1, January 2020

Pages: 524 - 527

A Review Paper on Network Security and Cryptography

Preeti Dewangan

Share this article

Research Paper, Engineering, India, Volume 8 Issue 8, August 2019

Pages: 1357 - 1360

An Advanced Implementation for Cryptography and Encryption in Cloud Computing Using Identity Based Encryption Techniques

Indra Kishor

Share this article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 2, November 2012

Pages: 20 - 22

Parallel Generators of Pseudo-random Numbers with Control of Calculation Errors

S. Dichenko, O. Finko

Share this article

Survey Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 711 - 724

A Survey on Advanced Encryption Standard

Sandeep Kumar Rao, Dindayal Mahto, Dr. Danish Ali Khan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 402 - 405

Implementation of DES Algorithm in Python

Sakshi Agarwal, P K Bharti, Rajesh Kumar Pathak

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 9 - 16

A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 65 - 69

Prevention of Phishing Threats using Visual Cryptography and One Time Password (OTP)

Sneha M. Shelke, Prachi A. Joshi

Share this article

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 11, November 2016

Pages: 102 - 104

Study of Three Pass Protocol on Data Security

Robbi Rahim, Ali Ikhwan

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 1000 - 1004

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Vardireddy Harish Kumar Reddy, K. Sashi Rekha

Share this article

Research Paper, Computer Science & Engineering, Ethiopia, Volume 7 Issue 3, March 2018

Pages: 179 - 182

A Comparison of Different Approaches in Text Steganography

Tewhasom Aregay Weldu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 243 - 245

Web-based Honeypot Tool for Website Analysis

Prof. Manoj Dhande, Prashant Patil, Supriya Mhashelkar, Avanti Patil, Shweta Jadhav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 475 - 488

Image Steganography Based on Improved LSB Embedding and AES Cryptography

Abhishek Singh

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 98 - 102

Secured Digital Image Sharing by using NVSS

Pramod Shimgekar, Kishor Wane

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 69 - 74

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

S. Rajeswari, Dr V. Anuratha

Share this article

Review Papers, Information Security, India, Volume 6 Issue 4, April 2017

Pages: 1871 - 1875

A Review of Image Encryption Using Chaos based Techniques

Shourya Chand, Ritik Aggarwal, Ekansh Dubey

Share this article

Research Paper, Computer Science & Engineering, Myanmar, Volume 8 Issue 3, March 2019

Pages: 1516 - 1520

Secure Data Transmission of Video Steganography by Hashing Pixel Values with DWT

Hnin Lai Nyo, Aye Wai Oo

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1776 - 1781

DDoS Attack Defense against Source IP Address Spoofing Attacks

Archana S. Pimpalkar, Prof. A. R. Bhagat Patil

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 294 - 297

BPCS Steganography and Visual Cryptography: An Advance Technique for Online Payment Security in E-Commerce for Developing Countries

Vaishnavi J. Deshmukh, Dr. A. S. Alvi

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 11, November 2015

Pages: 607 - 612

Classical Image Encryption and Decryption

Noor Dhia Kadhm Al-Shakarchy, Hiba Jabbar Al- Eqabie, Huda Fawzi Al- Shahad

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 680 - 683

Secure Image Based One Time Password

Neha Vishwakarma, Kopal Gangrade

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 922 - 925

The Influence of Classical Information on Crypto Analysis

Sohil R Shah

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2058 - 2060

Considering Geo-Scattered Big Data in Progressed Schema of Map Reduce

Ashwini R S, Geetha.N.B

Share this article

Research Paper, Information Technology, Congo, Volume 7 Issue 2, February 2018

Pages: 624 - 628

Proposal for a Way to Counter the Falsification of e-Mails Exchanged using the Outlook E-Mail Client

Assistant Bertin Lobo Minga

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 80 - 82

Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny, Anisha Antu

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 83 - 86

Data Hiding Method Using Adaptive Pixel Pair Matching

Shaikh Salman, Prof. S. R. Kinge

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 190 - 197

Cyber Security for Remote Patient Monitoring System

B. Manjulatha

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 990 - 994

A Steganography Algorithm and Cryptography Techniques for Hiding Image

Zanbaq Hekmet Thanon

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 393 - 405

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 662 - 665

An Introduction of Advanced Encryption Algorithm: A Preview

Asfiya Shireen Shaikh Mukhtar, Ghousiya Farheen Shaikh Mukhtar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 389 - 392

A Survey on Data Hiding in Encrypted Images

Diptee D. Lad, Sindhu M. R.

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 2, February 2018

Pages: 903 - 917

Proposed Email System Security based Bio-Chaos Modified Hash and Modified AES

Dr. Haider K. Hoomod, Arkan Mohammed Radi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 12, December 2018

Pages: 1187 - 1191

Key Aggregate Cryptosystem for Secure Group Data Sharing on Cloud

Smital Erande

Share this article

Research Paper, Law, India, Volume 8 Issue 2, February 2019

Pages: 2207 - 2215

The Bitcoins: A Scam or the Currency of the Future

Nilanjan Chakraborty

Share this article

Research Paper, Computer Science, India, Volume 2 Issue 9, September 2013

Pages: 115 - 118

Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy

S. Kavitha, M. Parveentaj

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 413 - 418

A Study on Threats in Wireless Sensor Networks

Muruganandam. A, Bagyalakshmi. P

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 11, November 2016

Pages: 926 - 929

A Review-Substitution Based (2,8) Chaos Secret Image Sharing Scheme in Visual Cryptography

Somprabha Verma, Dolly Gautam

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 712 - 717

Development of Visual Cryptography Technique for Authentication using Facial Images

Bhagyashri P. Kandalkar, Gopal D. Dalavi

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 6 Issue 3, March 2017

Pages: 676 - 680

Relative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems

Anupama S

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 686 - 688

Vehicle Parking System

G. Latha, V. K. Annapurna

Share this article

Research Paper, Information Technology, India, Volume 7 Issue 3, March 2018

Pages: 846 - 849

System Monitoring and Communication

Omkar Kolambkar, Namita Kolambkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 980 - 983

Secure Forensic Report Retrieval Application using Cipher Text-Policy Attribute-Based Encryption

Vinod I. Jondhale, Manisha Y. Joshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1579 - 1582

Enhancing Security and Speed of Sha-192 with Higher Avalanche

Sushama Ingale, Arun Jhapate

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 59 - 64

Enhancing Security in Cloud Storage using ECC Algorithm

Ravi Gharshi, Suresha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 146 - 151

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Patel Dhaval Dhirubhai, Singh Kashkumar Nirmalsingh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 689 - 692

Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra, G. Sujatha

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 188 - 190

Performance Analysis of Various Secret Sharing Techniques

Surbhi Sharma, Pradeep Kumar

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 9, September 2016

Pages: 781 - 784

Energy Efficient and Secure Image Communication over Wireless Network

Amandeep Sharma, Dr. Parvinder Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 309 - 312

A Review on DNA based Encryption and Steganography

Mumthas S, Lijiya A

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 736 - 742

Defending Wormhole Attack using Cryptographic Routing Technique

Malvika Rajput, C.P. Singh

Share this article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1717 - 1721

Key Policy Attribute Based Encryption in Cloud Storage

Sonali Deshpande, Dipa Dharmadhikari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 228 - 231

Privacy Preserving Data Sharing With CP-ABE

Neeta S. Nipane, Nutan M. Dhande

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 639 - 642

RSA Cryptosystem Using Verilog

Deepak Mehra, Dr. Neelam Srivastava

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 134 - 137

Sharing Approach for Securing Transaction based on VC & TS Framework

Vasanth SVL, G. Kishore

Share this article

Review Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 106 - 109

Review of Role of Digital Video in Information Security

Dinesh Goyal, Pratima Jha

Share this article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 493 - 499

Extended Capabilities of Feature-Extraction for Digital Image Sharing by Diverse Image Media

Snehal Pawar, Shubhangi Suryawanshi

Share this article

Research Proposals or Synopsis, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1187 - 1201

Detection of Scene Change in Video

Chandra Shekhar Mithlesh, Dolley Shukla

Share this article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 878 - 881

A Novel Approach to Anti-Phishing Using Visual Cryptography

Sofia Backiya B., Geetha M., Sathya M., Preethika D.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 329 - 334

Secure and Optimized Algorithm for Implementation of Digital Signature

Isha Jauhari, Jitendra Kumar

Share this article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 2 Issue 8, August 2013

Pages: 438 - 444

Proposed Methods of IP Spoofing Detection & Prevention

Sharmin Rashid, Subhra Prosun Paul

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 2, February 2014

Pages: 305 - 310

Anti Phishing using Visual Cryptography

Amit Navarkar, D. A. Phalke

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2044 - 2048

New Secure and Advanced Algorithm for Stream Ciphers Extended RC4 and FPGA Implementation

Nikhil Sankar, K. Kalpana

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 138 - 141

Effective Watermarking Adoption in Digital Imaging Copyright Protection Environment

K. Satya Sri, Gunna Kishore

Share this article

Review Papers, Software Engineering, India, Volume 5 Issue 11, November 2016

Pages: 549 - 550

Review on the Security Perspectives of Service Oriented Architecture (SOA)

Krishnadas Ravindran

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1531 - 1535

Low Latency for File Encryption and Decryption Using BRA Algorithm for Secure Transmission of Data

Kalyani V. Gulhane, Prof. G. D. Dalvi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1862 - 1865

An Approach for Distributed Data Possession in Multi-Cloud using SelCSP

Shaikh Rahil Ahemad, Lalit Dole

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1566 - 1568

FPGA Implementation of Cryptographic Hummingbird Algorithm with Improved Security: A Review

Nikita Samrit, Shubhada Thakare

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 104 - 108

A Reformed Security Scheme for False Node Detection in Wireless Ad Hoc Networks

J. Nithyapriya, Dr. V. Pazhanisamy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1186 - 1189

A Survey on Encryption Techniques

Mahendra Kumar Sahu, Mohd. Shajid Ansari

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 3, March 2018

Pages: 1887 - 1892

Proposed Adaptive Steganography

Raghad Khalid Mohammed, Woud Majid Abed

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1075 - 1078

DNA Based Cryptography

Durga Karapurkar, Veena Bhaskaran, Shreya Bale, Preeti Pednekar

Share this article

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 8, August 2013

Pages: 377 - 381

Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA

Chityala Prathyusha, P. Sharmila Rani

Share this article

Research Paper, Mathematics, India, Volume 3 Issue 4, April 2014

Pages: 129 - 133

Quantum Cryptography Implementation in Wireless Networks

Jarrar Ahmed, Ashish Kumar Garg, Man Singh, Sham Bansal, Mohammad Amir

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 449 - 455

Security of Information Using Cryptography and Image Processing

Mrunalinee Patole, Sheela A Bankar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 911 - 913

A Survey on Security of Association Rules Using RDT in Distributed Network

Anand Bhabat, R. A. Satao

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 736 - 740

One Time Password Scheme for Identity Based Encryption

Padmavati Kshirsagar, S. Pratap Singh

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 492 - 495

Key Aggregate Method for Secure Data Sharing in Cloud Storage Using MD5

Varsha S. Kadam, R. H. Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 278 - 281

Stegano-Cryptographic Technique for Online Polling System

Monalisa Hati

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 185 - 189

WSEECM: Wireless Sensor Network System with Secure and Energy Efficient Cluster Management

Ruchika Jain

Share this article

Review Papers, Electronics & Communication Engineering, India, Volume 6 Issue 4, April 2017

Pages: 2415 - 2421

Energy Efficient, Distributed Clustering Approach for Ad Hoc Wireless Sensor Network

Maninder Singh, Taranjeet Singh

Share this article

M.Tech / M.E / PhD Thesis, Digital Signal Processing, India, Volume 7 Issue 1, January 2018

Pages: 1721 - 1731

Implementation of Cryptographic Method for Secure Audio Data Hiding in Digital Image

Pranjali Ihare, V. T. Gaikwad

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 233 - 235

Data Storage using Homomorphic Encryption

Praveen Kumar

Share this article

Research Paper, Mathematics, Mali, Volume 8 Issue 11, November 2019

Pages: 1659 - 1666

Optimal Ate Pairing on Elliptic Curves with Embedding Degree 21

Mahamadou Abdou TOURE, Karim SAMAKE, Sinaly TRAORE

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 12, December 2019

Pages: 1796 - 1803

Security through Steganography - A Survey

Manu Narula, Chahat Goyal, Nikhil Sinha

Share this article



Top