Chaotic Watermarking for Authentication
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2013-07-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|