Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Using different techniques of steganography deducting null cipher in plain text
Allah Ditta; Cai Yongquan; Khurram Gulzar Rana; Kong Shanshan; Muhammad Azeem; Tahadray Jean
International Journal of Wireless and Mobile Computing (IJWMC), 2015 Vol.9 No.4, pp.317 - 324
18 + 10 =

Thank you for your feedback.