On subliminal cryptography
Other Title(s)
تشفير القنوات غير المحسوسة
Author
Source
Issue
Vol. 3, Issue 1 (31 Mar. 2006), pp.124-130, 7 p.
Publisher
University of Baghdad College of Science for Women
Publication Date
2006-03-31
Country of Publication
Iraq
No. of Pages
7
Main Subjects
Abstract EN
In recent years, cryptography has played a big role especially in computer science for information security.
Generally, there are several approaches in cryptography such as classical methods, stream cipher, block cipher and public-key methods.
The common feature among them is the cipher text is unreadable or not understood.
But in the new approach (Subliminal approach), the cipher text is readable or understood, this is an important feature.
In this paper we will present two algorithms for subliminal cryptography with examples.
American Psychological Association (APA)
al-Bundi, Shayma Salman. 2006. On subliminal cryptography. Um-Salama Science Journal،Vol. 3, no. 1, pp.124-130.
https://search.emarefa.net/detail/BIM-369257
Modern Language Association (MLA)
al-Bundi, Shayma Salman. On subliminal cryptography. Um-Salama Science Journal Vol. 3, no. 1 (2006), pp.124-130.
https://search.emarefa.net/detail/BIM-369257
American Medical Association (AMA)
al-Bundi, Shayma Salman. On subliminal cryptography. Um-Salama Science Journal. 2006. Vol. 3, no. 1, pp.124-130.
https://search.emarefa.net/detail/BIM-369257
Data Type
Journal Articles
Language
English
Notes
Includes appendix : p. 129
Record ID
BIM-369257