Return to Article Details The Application of the Blowfish Algorithm and the Least Significant Bit Method for Securing Student Transcripts Download Download PDF