

Publisher: IGI Global_journal
E-ISSN: 1930-1669|6|4|94-116
ISSN: 1930-1650
Source: International Journal of Information Security and Privacy (IJISP), Vol.6, Iss.4, 2012-10, pp. : 94-116
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










A general framework for robust watermarking security
By Barni M. Bartolini F. Furon T.
Signal Processing, Vol. 83, Iss. 10, 2003-10 ,pp. :