Login / Signup
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.
Xinpeng Zhang
Shuozhong Wang
Published in:
KES (2) (2005)
Keyphrases
</>
computationally efficient
computational cost
lightweight
secret key
data structure
computational complexity
significant improvement
digital images
sufficient conditions
theoretical analysis
smart card