Buscas alternativas:
authentication algorithm » segmentation algorithm (Expandir a busca)
bit authentication » art authentication (Expandir a busca), line authentication (Expandir a busca), new authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using bit » using bio (Expandir a busca), using beta (Expandir a busca), using cbct (Expandir a busca)
authentication algorithm » segmentation algorithm (Expandir a busca)
bit authentication » art authentication (Expandir a busca), line authentication (Expandir a busca), new authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using bit » using bio (Expandir a busca), using beta (Expandir a busca), using cbct (Expandir a busca)
1
“.... In the first proposed algorithm, the watermarked bits are inserted in the frequency domain using the...”
New fragile image watermarking schemes using chaotic sequences
Dissertação