Return to Article Details Mathematical aspects of the combined application of the AES algorithm and steganographic methods in authentication key protection Download Download PDF