1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.5, September 2013 DOI : 10.5121/ijnsa.2013.5504 43 IMAGE AUTHENTICATION THROUGH Z-…
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 225–232, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3625 IMAGE CODING THROUGH Z- TRANSFORM WITH LOW ENERGY…