2017
DOI: 10.14257/ijsia.2017.11.9.01
|View full text |Cite
|
Sign up to set email alerts
|

Vernam Conjugated Manipulation of Bit-plane Complexity Segmentation

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Polybius put the letters in the column line array size of 5 × 5. The way this system works is that every letter is expressed as rows and columns in which the letters are placed [6][11] [12]. For example, the letter "A" is encoded with "1-1", "B" as "1-2", "C" as "1-3", "D" as "1-4", "E" as "1-5" and so on.…”
Section: Polybius Squarementioning
confidence: 99%
“…Polybius put the letters in the column line array size of 5 × 5. The way this system works is that every letter is expressed as rows and columns in which the letters are placed [6][11] [12]. For example, the letter "A" is encoded with "1-1", "B" as "1-2", "C" as "1-3", "D" as "1-4", "E" as "1-5" and so on.…”
Section: Polybius Squarementioning
confidence: 99%
“…Data security needs to be improved by checking similar documents [22]- [26] Document similarity measure is a technique for measuring the level of similarity of documents. It is always used in the academic world.…”
Section: Similaritymentioning
confidence: 99%
“…Steganography is a technique to hide personal information with something that results will look like other standard information [5]- [7]. Media used is generally a different medium with confidential information carrier media, where this is the function of steganography technique, which is a disguise technique using other media different so that confidential information in the first media is not visible [8].…”
Section: Theories: 21 Steganographymentioning
confidence: 99%