On subliminal cryptography

Other Title(s)

تشفير القنوات غير المحسوسة

Author

al-Bundi, Shayma Salman

Source

Um-Salama Science Journal

Issue

Vol. 3, Issue 1 (31 Mar. 2006), pp.124-130, 7 p.

Publisher

University of Baghdad College of Science for Women

Publication Date

2006-03-31

Country of Publication

Iraq

No. of Pages

7

Main Subjects

Mathematics

Abstract EN

In recent years, cryptography has played a big role especially in computer science for information security.

Generally, there are several approaches in cryptography such as classical methods, stream cipher, block cipher and public-key methods.

The common feature among them is the cipher text is unreadable or not understood.

But in the new approach (Subliminal approach), the cipher text is readable or understood, this is an important feature.

In this paper we will present two algorithms for subliminal cryptography with examples.

American Psychological Association (APA)

al-Bundi, Shayma Salman. 2006. On subliminal cryptography. Um-Salama Science Journal،Vol. 3, no. 1, pp.124-130.
https://search.emarefa.net/detail/BIM-369257

Modern Language Association (MLA)

al-Bundi, Shayma Salman. On subliminal cryptography. Um-Salama Science Journal Vol. 3, no. 1 (2006), pp.124-130.
https://search.emarefa.net/detail/BIM-369257

American Medical Association (AMA)

al-Bundi, Shayma Salman. On subliminal cryptography. Um-Salama Science Journal. 2006. Vol. 3, no. 1, pp.124-130.
https://search.emarefa.net/detail/BIM-369257

Data Type

Journal Articles

Language

English

Notes

Includes appendix : p. 129

Record ID

BIM-369257