Skip to main content

Advances, Systems and Applications

Table 3 The output watermarks of both a) rotated images with 20o.b) various cropped lion images

From: A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system