CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - ASCII
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - ASCII - List
[
CA auth
]
BBS-ASCII-JAVAtansfer
DL : 0
看文件名就知道了吧。。。赫赫,欢迎大家下载-read the papers to know the name of it. . . Illustrious and you are welcome to download
Date
: 2008-10-13
Size
: 11.42kb
User
:
Shi Wenzhe
[
CA auth
]
BBS-ASCII-JAVAtansfer
DL : 0
看文件名就知道了吧。。。赫赫,欢迎大家下载-read the papers to know the name of it. . . Illustrious and you are welcome to download
Date
: 2025-12-22
Size
: 11kb
User
:
Shi Wenzhe
[
CA auth
]
ss-1.5-src
DL : 0
Here is an easy way to decode magnetic cards to ascii and binary data. Tested and working
Date
: 2025-12-22
Size
: 54kb
User
:
xu liu
[
CA auth
]
ascii
DL : 0
php 中文转ascii编码转换工具. 转换之后不能做处理入到页面中直接就能显示-php to ascii
Date
: 2025-12-22
Size
: 1kb
User
:
ganggang
[
CA auth
]
Yush.java.tar
DL : 0
This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII code of the character at that index-65. Step3: Sum all the values and mod 26. Step4: Return the key. Algorithm A2 Step1: Take the string which you want to encrypt. Step2: Find the number of spaces. Step3: We add 65 to number of space. Step4: Take a string s. Step5: Add character representing number of spaces to that string. Step6: Calculate the word length of all the words present in the string and 65 to it. Step7: Now append the character that represents the word length. Step8: Subtract the number 1 and Add the number 1 with the ASCII value of the characters at alternate position. Step9: Add the key to each character in the string. Step10: Subtract 65 and the value so obtained modulo 26. Step11: Cipher text obtained.-This is a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII code of the character at that index-65. Step3: Sum all the values and mod 26. Step4: Return the key. Algorithm A2 Step1: Take the string which you want to encrypt. Step2: Find the number of spaces. Step3: We add 65 to number of space. Step4: Take a string s. Step5: Add character representing number of spaces to that string. Step6: Calculate the word length of all the words present in the string and 65 to it. Step7: Now append the character that represents the word length. Step8: Subtract the number 1 and Add the number 1 with the ASCII value of the characters at alternate position. Step9: Add the key to each character in the string. Step10: Subtract 65 and the value so obtained modulo 26. Step11: Cipher text obtained.
Date
: 2025-12-22
Size
: 1kb
User
:
Aman Virmani
[
CA auth
]
LSB
DL : 0
Steganography is a branch of information hiding. It allows the people to communicate secretly. Asincreasingly more material becomes available electronically, the influence of steganography on our liveswill continue to grow. Many confidential information were leaked to a rival firm using steganographic toolsthat hid the information in music and picture files. The application of steganography is an importantmotivation for feature selection. A new steganographic algorithm for 8bit(grayscale) or 24bit (colour image) is presented in this article, based on Logical operation. Algorithm embedded Ascii code of text in to LSB of cover image.
Date
: 2025-12-22
Size
: 82kb
User
:
corialey
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.