Chaotic Watermarking for Authentication

This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...

Full description

Saved in:
Bibliographic Details
Main Author: Melad Saeed
Format: Article
Language:English
Published: Mosul University 2013-07-01
Series:Al-Rafidain Journal of Computer Sciences and Mathematics
Subjects:
Online Access:https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!