|
|
|
Muhaimin Hasanudin,Deni Kuswoyo,Boy Yuliadi
Pág. 153 - 160
This study uses the technique of incognito data and information into a container in the form of images combined with the addition of the password by using the method of Least Significant Bit (LSB) and the method of Haar Wavelet. Testing the system by sen...
ver más
|
|
|