Media Coverage of this Article
Found additional news media or blog coverage for the article? Please contact us at
submission@sciepub.com
.
Related keywords
network security
blowfish
cryptography
embedded system
list significant bit
steganography