[1]
“A Survey on Watermarking Different Techniques and Attacks”, IJERAT, vol. 2, no. 1, pp. 01–07, Jan. 2016, Accessed: May 21, 2024. [Online]. Available: https://ijerat.com/index.php/ijerat/article/view/97