Login / Signup

Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem.

Naveed IslamWilliam PuechRobert Brouzet
Published in: Media Forensics and Security (2011)
Keyphrases