2018
DOI: 10.1088/1742-6596/1007/1/012003
|View full text |Cite
|
Sign up to set email alerts
|

Combination Base64 Algorithm and EOF Technique for Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
3

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2
2

Relationship

2
8

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 7 publications
0
28
0
3
Order By: Relevance
“…Gale-Shapley has a proposed rule of each man n to each woman. In the process of algorithm execution, each man has an alternative pair and free, but every woman must pair [17] [18]. Women are definitely in pairs even if their partner can change.…”
Section: Gale-shapley Algoritmmentioning
confidence: 99%
“…Gale-Shapley has a proposed rule of each man n to each woman. In the process of algorithm execution, each man has an alternative pair and free, but every woman must pair [17] [18]. Women are definitely in pairs even if their partner can change.…”
Section: Gale-shapley Algoritmmentioning
confidence: 99%
“…The variability decrease is the key aspect of the quality improvement [17]- [20] There are two types of causes variation, assignable and standard. The assignable causes are not the regular part of the process, and we can identify them.…”
Section: Statistical Process Control (Spc)mentioning
confidence: 99%
“…Data sharing systems cause security problems to be one of the weaknesses of data communications in the network, in addition to other current trends is to give full responsibility to the computer to manage personal and business activities such as data transfer between computers in the network [14]- [16]. For that required a computer system that has a security level that can be guaranteed [17]- [20]. Based on these facts, there should be an information security at the time of sending information [21].…”
Section: Introductionmentioning
confidence: 99%