Nwe, Aye Aye; Win, Myat Su
(Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the ...