1. IT Applications Theory SlideshowsData SecurityBy Mark Kelly Vceit.com 2. Contents • Procedures & equipment to protect data • Consequences of not protecting data‘Zits’…
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 DOI : 10.5121/ijcnc.2013.5414 173 AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO…