Abstract: Many kinds of codes which possess two cycle structures over two special finite commutative chain rings, such as ${\mathbb {Z}}_{2}{\mathbb {Z}}_{4}$ -additive cyclic codes and quasi-cyclic ...
Abstract: The existing commutative encryption and watermarking (CEW) methods based on feature invariants can achieve both the robustness of the watermarking algorithm and the security of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results