{"id":25802,"date":"2014-09-04T02:44:14","date_gmt":"2014-09-04T06:44:14","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25802"},"modified":"2014-09-04T02:44:14","modified_gmt":"2014-09-04T06:44:14","slug":"encryption-key-distribution-applying-steganography-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-key-distribution-applying-steganography-video.php","title":{"rendered":"Encryption Key Distribution Applying Steganography &#8211; Video"},"content":{"rendered":"<p><br \/>Encryption Key Distribution Applying Steganography<br \/><span>The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential element of secure information communications. In this proposed technique, we use ideas originated...<\/span><span><\/p>\n<p>By: <\/span>Magdy Saeb<span style=\"color: #666666; font-size: 11px;\"<br \/><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.youtube.com\/watch?v=uZr291FhU0Y\" title=\"Encryption Key Distribution Applying Steganography - Video\">Encryption Key Distribution Applying Steganography - Video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Encryption Key Distribution Applying Steganography The quondam problem of key distribution for symmetric ciphers has been, and still is, an essential element of secure information communications. In this proposed technique, we use ideas originated... By: Magdy Saeb<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25802","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25802"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25802"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25802\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}