How secure would it be if you applied custom algorithms (that you obviously wouldn't reveal to the public) to a hashed password? Like splitting up a hashed string, shuffling it around, possibly even do something else with it to further shuffle it. Then shuffle it back and compare the user's input to the original hash.
Then the next question, all of this shuffling is code, in a class, in a file. Can this not be reverse-engineered or somehow retrieved in some way?