Proposal to Generate a Various Key from Image for Various Encryption Methods
Proposal to Generate a Various Key from Image for Various Encryption Methods

Shatha Habeeb; Eman Shakeer

Volume 31, 1B , January 2013, , Page 107-114

https://doi.org/10.30684/etj.31.1B.12

Abstract
  There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. ...  Read More ...