Archive > Volume 35 Issue 2 > 2012,35(2):143-148. DOI:10.11835/j.issn.1000-582X.2012.02.023 CSTR:[cstr] Prev Next

Watermarking algorithm based on Her transform