Login / Signup
A DCT-based Information Hiding Method for Network Authentication.
Wei Song
Shuanghui Zou
Yifei Tian
Chen Li
Su Sun
Simon Fong
Published in:
BDIOT (2017)
Keyphrases
</>
image processing
image compression
multiscale
computational complexity
image analysis
digital images