It's All in The Codes. Mystery Cache
This cache has been locked, but it is available for viewing.
A cache by [DELETED_USER]
Hidden
:
2/28/2015
Please note Use of geocaching.com services is subject to the terms and conditions
in our disclaimer.
The cache is not at the posted coordinates. 
Puzzles we all love a good puzzle or mystery,
We look for the pattern or the secret message hidden within, it could be in how many numbers in so many lines it could be numbers written as words they can even be invisible on the page, and part of the puzzle is first seeing it, before solving it. Other ways of hiding things ciphers, morse code for instance.
or
did I put it there. I could even hide it in picture sizes or as I have seen in weblinks but at the end of the day they are all solvable. Other examples of numbers hidden in pictures are these are commonly seen everyday around shops and on vehicles they all play a part in our life.

But the one thing is they all have are numbers attached from QR code to the Barcode to the Aztec code there are so many different ones the extract below is from Wikipedia. In cryptography a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In non-technical usage, a 'cipher' is the same thing as a 'code'; however, the concepts are distinct in cryptography. In classical cryptography, ciphers were distinguished from codes. Codes generally substitute different length strings of characters in the output, while ciphers generally substitute the same number of characters as are input. There are exceptions and some cipher systems may use slightly more, or fewer, characters when output versus the number that were input. Codes operated by substituting according to a large codebook which linked a random string of characters or numbers to a word or phrase. For example, "UQJHSE" could be the code for "Proceed to the following coordinates." When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext. The ciphertext message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it. The operation of a cipher usually depends on a piece of auxiliary information, called a key (or, in traditional NSA parlance, a cryptovariable). The encrypting procedure is varied depending on the key, which changes the detailed operation of the algorithm. A key must be selected before using a cipher to encrypt a message. Without knowledge of the key, it should be extremely difficult, if not impossible, to decrypt the resulting ciphertext into readable plaintext. Most modern ciphers can be categorized in several ways • By whether they work on blocks of symbols usually of a fixed size (block ciphers), or on a continuous stream of symbols (stream ciphers). • By whether the same key is used for both encryption and decryption (symmetric key algorithms), or if a different key is used for each (asymetric key algorithms). If the algorithm is symmetric, the key must be known to the recipient and sender and to no one else. If the algorithm is an asymmetric one, the enciphering key is different from, but closely related to, the deciphering key. If one key cannot be deduced from the other, the asymmetric key algorithm has the public/private key property and one of the keys may be made public without loss of confidentiality.






Additional Hints
(No hints available.)
Treasures
You'll collect a digital Treasure from one of these collections when you find and log this geocache:

Loading Treasures