Buscas alternativas:
authentication algorithm » segmentation algorithm (Expandir a busca)
codes authentication » food authentication (Expandir a busca), new authentication (Expandir a busca), user authentication (Expandir a busca)
processing codes » processing bodies (Expandir a busca), processing zones (Expandir a busca), processing modules (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
authentication algorithm » segmentation algorithm (Expandir a busca)
codes authentication » food authentication (Expandir a busca), new authentication (Expandir a busca), user authentication (Expandir a busca)
processing codes » processing bodies (Expandir a busca), processing zones (Expandir a busca), processing modules (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
1
“...-correcting code whose message is formed from a binary chaotic sequence and from bits of the original image...”
New fragile image watermarking schemes using chaotic sequences
Dissertação