Abstract: Many kinds of codes which possess two cycle structures over two special finite commutative chain rings, such as ${\mathbb {Z}}_{2}{\mathbb {Z}}_{4}$ -additive cyclic codes and quasi-cyclic ...
Abstract: The existing commutative encryption and watermarking (CEW) methods based on feature invariants can achieve both the robustness of the watermarking algorithm and the security of the ...