For protecting the images from attacks, encryption techniques are required. Recently, new and efficient chaos-based techniques have been suggested to ...
確定! 回上一頁