Search Results - "Computer security Databases"

  • Showing 1 - 1 results of 1
Refine Results
  1. 1

    Efficient 2-level image tamper detection using 3 LSB watermarking technique by Sajjad Dadkhah

    Published 2025
    Subjects: “…Computer security -- Databases…”
    Access PDF.
    Dissertation Restricted Universiti Teknologi Malaysia

Search Tools: