Answer:
b.
Step-by-step explanation:
disguising is a bit of a misleading term here. But basically, yeah, you're replacing one message by an 'encrypted' message, using mathematical rules. To reconstruct the original message, you'll need some key data and the inverse mathematical rules.