Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - ASCII
Search - ASCII - List
看文件名就知道了吧。。。赫赫,欢迎大家下载-read the papers to know the name of it. . . Illustrious and you are welcome to download
Date : 2008-10-13 Size : 11.42kb User : Shi Wenzhe

看文件名就知道了吧。。。赫赫,欢迎大家下载-read the papers to know the name of it. . . Illustrious and you are welcome to download
Date : 2025-12-22 Size : 11kb User : Shi Wenzhe

Here is an easy way to decode magnetic cards to ascii and binary data. Tested and working
Date : 2025-12-22 Size : 54kb User : xu liu

DL : 0
php 中文转ascii编码转换工具. 转换之后不能做处理入到页面中直接就能显示-php to ascii
Date : 2025-12-22 Size : 1kb User : ganggang

This a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII code of the character at that index-65. Step3: Sum all the values and mod 26. Step4: Return the key. Algorithm A2 Step1: Take the string which you want to encrypt. Step2: Find the number of spaces. Step3: We add 65 to number of space. Step4: Take a string s. Step5: Add character representing number of spaces to that string. Step6: Calculate the word length of all the words present in the string and 65 to it. Step7: Now append the character that represents the word length. Step8: Subtract the number 1 and Add the number 1 with the ASCII value of the characters at alternate position. Step9: Add the key to each character in the string. Step10: Subtract 65 and the value so obtained modulo 26. Step11: Cipher text obtained.-This is a new algorithm in which we encrypt on the basis of position of the character. Algorithm 1 for key generation and Algorithm 2 is for encryption Algorithm A1 Step1: Let the key be ‘k’. Step2: Multiply the index number +1 with its ASCII code of the character at that index-65. Step3: Sum all the values and mod 26. Step4: Return the key. Algorithm A2 Step1: Take the string which you want to encrypt. Step2: Find the number of spaces. Step3: We add 65 to number of space. Step4: Take a string s. Step5: Add character representing number of spaces to that string. Step6: Calculate the word length of all the words present in the string and 65 to it. Step7: Now append the character that represents the word length. Step8: Subtract the number 1 and Add the number 1 with the ASCII value of the characters at alternate position. Step9: Add the key to each character in the string. Step10: Subtract 65 and the value so obtained modulo 26. Step11: Cipher text obtained.
Date : 2025-12-22 Size : 1kb User : Aman Virmani

DL : 0
Steganography is a branch of information hiding. It allows the people to communicate secretly. Asincreasingly more material becomes available electronically, the influence of steganography on our liveswill continue to grow. Many confidential information were leaked to a rival firm using steganographic toolsthat hid the information in music and picture files. The application of steganography is an importantmotivation for feature selection. A new steganographic algorithm for 8bit(grayscale) or 24bit (colour image) is presented in this article, based on Logical operation. Algorithm embedded Ascii code of text in to LSB of cover image.
Date : 2025-12-22 Size : 82kb User : corialey
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.