Login / Signup

Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.

Xinpeng ZhangShuozhong Wang
Published in: KES (2) (2005)
Keyphrases
  • computationally efficient
  • computational cost
  • lightweight
  • secret key
  • data structure
  • computational complexity
  • significant improvement
  • digital images
  • sufficient conditions
  • theoretical analysis
  • smart card