Abstract: The existing commutative encryption and watermarking (CEW) methods based on feature invariants can achieve both the robustness of the watermarking algorithm and the security of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results