Proposal to Generate a Various Key from Image for Various Encryption Methods

There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages. All three of these encryption methods use cryptography, or the science of scrambling data . Although there can...

Full description

Bibliographic Details
Main Authors: Shatha Habeeb, Eman Shakeer
Format: Article
Language:English
Published: Unviversity of Technology- Iraq 2013-01-01
Series:Engineering and Technology Journal
Subjects:
Online Access:https://etj.uotechnology.edu.iq/article_84092_97036184f88e24148e7a223121095d9e.pdf