Buscas alternativas:
authentication algorithm » segmentation algorithm (Expandir a busca)
of authentication » s authentication (Expandir a busca), food authentication (Expandir a busca), art authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using of » fusing of (Expandir a busca), using on (Expandir a busca), housing of (Expandir a busca)
authentication algorithm » segmentation algorithm (Expandir a busca)
of authentication » s authentication (Expandir a busca), food authentication (Expandir a busca), art authentication (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
using of » fusing of (Expandir a busca), using on (Expandir a busca), housing of (Expandir a busca)
1
“.... In the first proposed algorithm, the watermarked bits are inserted in the frequency domain using the...”
New fragile image watermarking schemes using chaotic sequences
Dissertação
2
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
3
Assuntos:
“...Dagman method...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese