Return to Article Details INFORMATION SYSTEM SECURITY USING THE DISCRETE COSINE TRANSFORM (DCT) METHOD Download Download PDF