商业上 发表于 2025-4-1 05:18:16

https://doi.org/10.1007/978-3-531-93353-5e client side, the SHA-256 hash of the original fingerprint image and sensitive personal information are encrypted and embedded into the fingerprint image using an advanced lossless data hiding scheme. At the service provider side, after the hidden data are extracted out, the fingerprint image can b

forebear 发表于 2025-4-1 07:36:23

http://reply.papertrans.cn/28/2799/279891/279891_62.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Digital Watermarking; Third International Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Conference proceedings 2005 Springer-Verlag Berlin Heide